In this work, the fusion cross section , fusion barrier distribution and the probability of fusion have been investigated by coupled channel method for the systems 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm with semi-classical and quantum mechanical approach using SCF and CCFULL Fortran codes respectively. The results for these calculations are compared with available experimental data. The results show that the quantum calculations agree better with experimental data, especially bellow the Coulomb barrier, for the studied systems while above this barrier, the two codes reproduce the data.
Background: Proper cleaning and shaping of the whole root canal space have been recognized as a real challenge, particularly in oval-shaped canals.This in vitro study was conducted to evaluate and compare the efficiency of different instrumentation systems in removing of dentin debris at three thirds of oval-shaped root canals and to compare the percentage of remaining dentin debris among the three thirds for each instrumentation system. Materials and methods: Fifty freshly extracted human mandibular molars with single straight oval-shaped distal root canals were randomly divided into five groups of ten teeth each. Group One: instrumentation with ProTaper Universal hand instruments, Group Two: instrumentation with ProTaper Universal rotary
... Show MoreModern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented. The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.
... Show MoreThe gas material balance equation (MBE) has been widely used as a practical as well as a simple tool to estimate gas initially in place (GIIP), and the ultimate recovery (UR) factor of a gas reservoir. The classical form of the gas material balance equation is developed by considering the reservoir as a simple tank model, in which the relationship between the pressure/gas compressibility factor (p/z) and cumulative gas production (Gp) is generally appeared to be linear. This linear plot is usually extrapolated to estimate GIIP at zero pressure, and UR factor for a given abandonment pressure. While this assumption is reasonable to some extent for conventional reservoirs, this may incur
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More