An analytical form of the ground state charge density distributions
for the low mass fp shell nuclei ( 40 A 56 ) is derived from a
simple method based on the use of the single particle wave functions
of the harmonic oscillator potential and the occupation numbers of
the states, which are determined from the comparison between theory
and experiment.
For investigating the inelastic longitudinal electron scattering form
factors, an expression for the transition charge density is studied
where the deformation in nuclear collective modes is taken into
consideration besides the shell model space transition density. The
core polarization transition density is evaluated by adopting the
shape of Tassie model together with the derived form of the ground
state charge density distribution. In this work, we devote our
investigation on 0 3 2 3 1 1
transition of Ti 50 , 0 1 2 1 1 1
transition
of Cr 50 and 0 2 2 2 1 1
of Cr 52 nuclei. It is found that the core
polarization effects, which represent the collective modes, are
essential for reproducing a remarkable agreement between the
calculated inelastic longitudinal C2 form factors and those of
experimental data.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
In this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreThe research to knows some biomechanics variables in different spots with and without players in basketball youth players and analysis by using destructive method in surfing study and the research were applied for jump shoot from one of basketball players in ( middle , left , right ) in side zone and out of zone also from three point shoot with and without defense and we depend on successful shoot on analyze .The results and conclusions that center of weight of the player on standby on high and knee angel and hips were more wide also the two angle of wrist , elbow on start of shooting be more wide with defender more than without defender .the maximum high center of weight and shooting angle and ball entrance being less degree with defender
... Show MoreObjective: To generate a model that conceptualizes the phenomenon of health promotion and its related factors.
Methodology: A grounded theory methodology is used as qualitative method to explore the health promotion as
phenomenon of interest and its other related factors from the perspectives of specialists in this field. The study is
carried out from January 2002 through September 2004. A sample of (20) specialists in health sciences are
selected and interviewed as experts in the area of health promotion. The investigators conducted intensive and
structured interviews with the specialists to collect the data. These interviews were transcribed verbatim,
analyzed and interpreted.
Results: Findings of the study indicat
The research aims to present a proposed strategy for the North Oil Company, and the proposed strategy took into account the surrounding environmental conditions and adopted in its formulation on the basis and scientific steps that are comprehensive and realistic, as it covered the main activities of the company (production and exploration activities, refining and refining activities, export and transport of oil, research and development activity, financial activity, information technology, human resources) and the (David) model has been adopted in the environmental analysis of the factors that have been diagnosed according to a
... Show Moreيهدف البحث الى تقديم استراتيجية مقترحة لشركة نفط الشمال ، وأخذت الاستراتيجية المقترحة بنظر الاعتبار الظروف البيئية المحيطة واعتمدت في صياغتها على اسس وخطوات علمية تتسم بالشمولية والواقعية ، اذ انها غطت الانشطة الرئيسية في الشركة (نشاط الانتاج والاستكشاف , نشاط التكرير والتصفية , التصدير ونقل النفط , نشاط البحث والتطوير , النشاط المالي , تقنية المعلومات , الموارد البشرية ) وقد اعتمد نموذج (David) في التحليل البيئي
... Show MoreSamples (4th) reviewed are deposited and stored in the Iraqi Natural History Museum (INHM), and there are 4th of them. Sciurus anomalous (Güldenstädt, 1785) species are preserved and mummified. It is a Caucasian squirrel (S. anomalus) that was medium in size, with a grayish-to-chestnut color, a golden gray back, and a golden tail. It is found in the forests of East and Southeast Asia. The variety possessed for the study was previously registered in the vertebrate literature by several authors and was stored by scientific methods in the museum. As a result of the multiplication and growth of these species, and to know the environmental changes that occurred in them, they were compared with models and samples found throughout Iraq
... Show MoreThe survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research
... Show More