Charge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show MoreChannel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThat the diplomatic work and its importance in foreign policy planning assumes the following points: 1. Choosing the tool in the sense of choosing the most correct tool that reflects the reality of the situation on the one hand and the disposal of strong energy to reach the implementation of the political decision. The declaration of war and entering into a resolution that uses force merely to face insulting ambassadors does not mean Power of the State concerned. But an imbalance in its foreign policy. 2. The coordination of the tools, that the foreign policy scheme must be such a role, and on the external style, diplomatic work, military action and propaganda must complement each other, to the extent that each of them is the first attac
... Show MoreThe Arab Islamic Manuscripts in the science libraries humanly global heritage in different types of knowledge and science, as they were not confined to a particular flag but extended to include all kinds of science, and to facilitate the knowledge of these types of manuscripts has been necessary to operate them indexed in most libraries , because it is important in determining the size of those manuscripts and set them up and facilitate the work of the investigators, as well as the significance of indexing to know printed manuscripts in order to avoid repetition of the publication of the manuscript more than once, especially if the deployment is to be characterized by accurate scientific integrity and following the origins of the scienti
... Show MoreSecurity reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreThe childhood of the most important stages throughout the human and which have been more vulnerable to various factors surrounding it and with the scientific and cognitive development in all fields surfaced many psychological phenomena that play a large role in influencing children and their behavior trends is the susceptibility of the lure of psychological phenomena which plays a major role in the social attitudes of individuals it may not be predictable so that individuals vary in between them in terms of vulnerability Balasthoa You do this only _bl that the same individual at different influenced Balasthoa different depending on the positions and this was research to achieve its objectives and that are known:
_ alasthoa The childre
Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy