The increased use of hybrid PET /CT scanners combining detailed anatomical information along withfunctional data has benefits for both diagnostic and therapeutic purposes. This presented study is to makecomparison of cross sections to produce 18F , 82Sr and68Ge via different reactions with particle incident energy up to 60 MeV as a part of systematic studies on particle-induced activations on enriched natNe, natRb, natGa 18O,85Rb, and 69Ga targets, theoretical calculation of production yield, calculation of requiredtarget and suggestion of optimum reaction to produce: Fluorine-18 , Strontium-82 andGermanium-68 touse in Hybrid Machines PET/CT Scanners.
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis investigation aims to study some properties of lightweight aggregate concrete reinforced by mono or hybrid fibers of different sizes and types. In this research, the considered lightweight aggregate was Light Expanded Clay Aggregate while the adopted fibers included hooked, straight, polypropylene, and glass. Eleven lightweight concrete mixes were considered, These mixes comprised of; one plain concrete mix (without fibers), two reinforced concrete mixtures of mono fiber (hooked or straight fibers), six reinforced concrete mixtures of double hybrid fibers, and two reinforced concrete mixtures of triple hybrid fibers. Hardened concrete properties were investigated in this study. G
The aim of this study is to investigate the main causes of the family violence and its
social effects.
The study reveals that main factors causes of the violence are interaction between
multi-factors.
The study shows that the poverty, low educational level, house crowded, large family
size, all of these variables causes of the violence, and then causes of family disorganization
and juvenile delinquency.
The study contain of three sections:
First: Focused on the causes of the violence.
Second: The interaction between multi factors.
Third: Social effects of family violence.
Background: Orthodontic mini-implants are increasingly used in orthodontics and the bone density is a very important factor in stabilization and success of mini-implant. The aim of this study was to observe the relationship among maximum bite force (MBF); body mass index (BMI); face width, height and type; and bone density in an attempt to predict bone density from these variables to eliminate the need for CT scan which have a highly hazard on patient. Materials and Methods: Computed tomographic (CT) images were obtained for 70 patients (24 males and 46 females) with age range 18-30 years. The maxillary and mandibular buccal cortical and cancellous bone densities were measured between 2nd premolar and 1st molar at two levels from the alveol
... Show MoreAn easy, eclectic, precise high-Performance Liquid Chromatographic (HPLC) procedure was evolved and validated to estimate of Piroxicam and Codeine phosphate. Chromatographic demarcation was accomplished on a C18 column [Use BDS Hypersil C18, 5μ, 150 x 4.6 mm] using a mobile phase of methanol: phosphate buffer (60:40, v/v, pH=2.3), the flow rate was 1.1 mL/min, UV detection was at 214 nm. System Suitability tests (SSTs) are typically performed to assess the suitability and effectiveness of the entire chromatography system. The retention time for Piroxicam was found to be 3.95 minutes and 1.46 minutes for Codeine phosphate. The evolved method has been validated through precision, limit of quantitation, specificity,
... Show MoreImage compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreThe purpose of this paper is to study the instability of the zero solution of some type of nonlinear delay differential equations of fourth order by using the Lyapunov-Krasovskii functional approach; we obtain some conditions of instability of solution of such equation.
This paper constructs a new linear operator associated with a seven parameters Mittag-Leffler function using the convolution technique. In addition, it investigates some significant second-order differential subordination properties with considerable sandwich results concerning that operator.
The aim of this paper is to present method for solving ordinary differential equations of eighth order with two point boundary conditions. We propose two-point osculatory interpolation to construct polynomial solution.