The two body model of (Core+n) within the radial wave functions of the cosh potential has been used to investigate the ground state features such as the proton, neutron and matter densities, the root mean square (RMS) nuclear proton, neutron, charge and mass radii of unstable neutron-rich 14B, 15C, 19C and 22N nuclei. The calculated results show that the two body model with the radial wave functions of the cosh potential succeeds in reproducing neutron halo in these nuclei.
Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built
The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAn integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreCrystalline silicon (c-Si) has low optical absorption due to its high surface reflection of incident light. Nanotexturing of c-Si which produces black silicon (b-Si) offers a promising solution. In this work, effect of H2O2 concentrations towards surface morphological and optical properties of b-Si fabricated by two-step silver-assisted wet chemical etching (Ag-based two-step MACE) for potential photovoltaic (PV) applications is presented. The method involves a 30 s deposition of silver nanoparticles (Ag NPs) in an aqueous solution of AgNO3:HF (5:6) and an optimized etching in HF:H2O2:DI H2O solution under 0.62 M, 1.85 M, 2.47 M, and 3.7 M concentrations of H2O<
... Show MoreThe language that consists of only twenty-eight letters, but it is so broad that we are unable to understand it from all sides and this expansion is mainly caused by imagination, so Arab imagination, whose language goes in all directions And as it always responds to our ears, ancient critics divide imagination into holistic and partial But the language is not limited to these parts only. Do we wonder, where is the structural method of wishing, hope, questions and other methods of all this? In this paper, we try to show the importance of the method of writing in moving imagination in an interactive way, and what is related to human feelings in most, if not all, of its methods By studying the poetry of the believers in the Ahl al-Bayt, pea
... Show More