The objective of this research is employ the special cases of function trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of Baghdad and Basra, has been the adoption of different periods of the functions belonging to see the change happening in the matrix matches and the impact that the strategies and decision-making available to each player and the impact on societ
... Show MoreThe study aimed at ideutifying the impact of scieutific skills in strategy and liabits of mind amony stueuts in tenth grade . The study demanded to choose a sampie that coutaiun (42) student of the fourth grade of the secondary school who were dirided into tow groups , the first is experimental studied according to scieutific skill strategy , and the other controlling , studied according to the usualway . An achievement test has been taken that adopted staudard for mind skills as research tools that are applid after ascertaining sincerity proved at the end of the experiment .The study has reached to the conclusion that there are statistically significant differnces in farour of the experiment group in both
... Show MoreThe aim of research is to identify the effect of using Waks strategy upon acquiring the psychological concepts and mind habits for students in the college of education. An experimental design with a partial adjustment of two experimental and control groups as well as a posttest were employed. The researcher divided the study sample into two groups: group one consisted of (38) students to represent the experimental group that was taught according to the waks strategy, and group two consisted of (35) students to represent the control group that was taught according to the traditional method. The sample was chosen based on some variables namely (Intelligence, Prior knowledge). The researcher has designed the research tools as th
... Show More
The research aims to identify the magnitude of the impact of external debt on the gross domestic product in Morocco, and the importance of research lies in the role that external debt plays in addressing structural imbalances, if it is best disposed of according to well-studied economic plans by specialists in this regard, especially if these debts are directed with Other resources, as it helps pay the costs of these debts (debt servicing) that the external debt also raises the level of gross domestic product, and the research starts from the hypothesis that: There is an effect of foreign debt on the GDP in Morocco, has contributed in one way or another to The exacerbation of the external debt, which affected the m
... Show MoreThe systems of governance in Europe are characterized by ancient democratic systems that have developed and developed through a long history of political conflicts that have emerged from a social reality that feeds them and receives the resulting effects. This is an achievement that has been achieved after the sacrifices and great efforts in formulating models of good governance through which to realize the aspirations of their peoples. . The democratic system operates within a balanced mechanism of two competing parties to manage and direct the work of the government and the parliament. The parties that achieve the majority in the elections carry out the functions of the government supported by their parliamentary base belonging to one
... Show MoreThis study is concerned with the evaluation of the effect of Euphrates River water quality in Al-Samawa region during
the period 1984-2003 on efficiency and reliability of reverse osmosis desalination systems by calculating the calcium
sulfate scaling index depending on the following indicators: - TDS, Ca+2, Mg+2, Na+1, Cl-1, So4-2, HCO3-1. It was
found from data analysis that this index for these units is greater than permissible limit. Also, the fitted relationship
between this index and TDS is logarithmic, i.e. this index varies more rapidly than TDS, and consequently it is more
representative to the water quality than TDS.
The challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum 〈L〉 for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A
... Show MoreThe challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum 〈L〉 for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A quantum Coupled-Channel Calculations are performed using CC code. The predictions of quantum mechanical approach are comparable with the measured data that is
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More