The state and partial level densities were calculated using the corresponding formulas that are obtained in the frame work of the exciton model with equidistant spacing model (ESM) and non-ESM (NESM). Different corrections have been considered, which are obtained from other nuclear principles or models. These corrections are Pauli Exclusion Principle, surface effect, pairing effect, back shift due to shell effect and bound state effect . They are combined together in a composite formula with the intention to reach the final formula. One-component system at energies less than 100 MeV and mass number range (50-200) is assumed in the present work. It was found that Williams, plus spin formula is the most effective approach to the composite formula, and it is in good agreement with experimental results. All calculation has been made using programs with MATLAB language written for this purpose.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreKnowledge of the distribution of the rock mechanical properties along the depth of the wells is an important task for many applications related to reservoir geomechanics. Such these applications are wellbore stability analysis, hydraulic fracturing, reservoir compaction and subsidence, sand production, and fault reactivation. A major challenge with determining the rock mechanical properties is that they are not directly measured at the wellbore. They can be only sampled at well location using rock testing. Furthermore, the core analysis provides discrete data measurements for specific depth as well as it is often available only for a few wells in a field of interest. This study presents a methodology to generate synthetic-geomechani
... Show MoreThe blade pitch angle (BPA) in wind turbine (WT) is controlled to maximize output power generation above the rated wind speed (WS). In this paper, four types of controllers are suggested and compared for BPA controller in WT: PID controller (PIDC), type-1 fuzzy logic controller (T1-FLC), type-2 fuzzy logic controller (T2-FLC), and hybrid fuzzy-PID controller (FPIDC). The Mamdani and Sugeno fuzzy inference systems (FIS) have been compared to find the best inference system used in FLC. Genetic algorithm (GA) and Particle swarm optimization algorithm (PSO) are used to find the optimal tuning of the PID parameter. The results of500-kw horizontal-axis wind turbine show that PIDC based on PSO can reduced 2.81% in summation error of power
... Show MoreNeurogenic inflammation is pivotal in dental pulp repair, involving complex interactions between sensory nerves, immune cells, and dental pulp stem cells (DPSCs). This review aimed to identify the favorable pathways of neurogenic inflammation and neurogenic differentiation of DPSCs in the pulpal healing process. Also, to identify the techniques used to evaluate these inflammatory and differentiation processes. Both PubMed and Google Scholar databases were employed in the search strategy using keyword combinations based on MeSH terms. The search was performed for published articles in English from January 2014 to November 2024, including studies with histological and molecular findings. 29 articles only met the inclusion criteria. Neurogenic
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreHerein, a biocomposite of crosslinked chitosan polyethylene glycol diglycidyl ether (CS-PEDGE), montmorillonite (MMT), and foodgrade algae (FGA) was successfully prepared by a hydrothermal technique. The resulting absorbent (CS-PEDGE/FGA/MMT) was assessed for its adsorption property with methyl violet 2B (MV 2B) a toxic cationic dye. The physicochemical properties of CS-EDGE/ FGA/MMT were assessed via various analytical techniques, including BET, Elemental analysis, pHpzc, and spectroscopy (FTIR, XRD, SEM-EDX). The influence of three adsorption variables, namely adsorbent dose (A: 0.02–0.1 g/100 mL), solution pH (B: 4–10), and contact time (C: 10–420 min) on the rate of MV 2B dye removal was examined using the Box-Behnken design (RSM-
... Show MoreGuanine has a variety of roles in chemistry, from its basic function in the storing and transferring genetic information to its usages in synthetic chemistry and other fields. Because of its distinct structure and biological importance, it is a fundamental component of contemporary study in organic chemistry and molecular biology. In this review, we focused on covering the synthetic pathways of various derivatives of guanine from the year 2000 until the present. As a result of the guanine molecule containing multiple functional groups, this gives us the ability to prepare several guanines such as O6-alkylating guanines, O6-benzylguanines, 8-aza-O6-benzylguanines, 9-substituted guanines, guanine-azo derivatives, guanine Schiff bases, guanin
... Show More