The nucleon momentum distributions (NMD) and elastic electron scattering form factors of the ground state for some 1f-2p-shell nuclei, such as 58Ni, 60Ni, 62Ni, and 64Ni
isotopes have been calculated in the framework of the coherent fluctuation model (CFM) and expressed in terms of the weight function lf(x)l2 . The weight function (fluctuation function) has been related to the nucleon density distribution (NDD) of the nuclei and determined from the theory and experiment. The NDD is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of the long-tail behavior at high momentum region of the NMD’s has been obtained by both the theoretical and experimental weight functions. The calculated elastic electron scattering form factors for considered isotopes are in reasonable agreement with those of experimental data throughout all values of momentum transfer q.
Increasingly, public organizations in the federal state are required to work together, as well as to work with others to achieve their objectives. In Iraq there are two levels of organizations, including federal and local, and these organizations have been forced to work for many years in an environment in which the responsibility for service delivery is shared between policy makers and service providers, and between local governments and the federal government. It is sometimes difficult to manage the relationship between these organizations (federal and local) and do not always provide the best possible outcome of this relationship. This paper reviews how to manage the relationship between local administrations and
... Show MoreThe covid-19 pandemic sweeping the world and has rendered a large proportion of the workforce as they are unable to commute to work. This has resulted in employees and employers seeking alternative work arrangements, including the software industry. Then comes the need for the global market and international presence of many companies to implement the global virtual teams (GVTs). GVTs members are gradually engaged in globalized business environments across space, time and organizational boundaries via information and communication technologies. Despite the advancement of technology, the project managers are still facing many challenges in communication. Hense, to become a successful project manager still a big challenge for them. This study
... Show MoreABSTRACT Background: Dental anomalies of teeth are major issue that contributes to dental problems encountered in general practice. The aim of this study is to measure the prevalence of dental anomalies and the associated etiological factors among 15 years old students in Basrah city –Iraq. Materials and methods: The total sample composed of 1000 students (435 males and 565 females) from urban area selected randomly from different high schools in the city. Diagnosis of dental anomalies were recorded by present or absent, diagnosis and recording of enamel defects were done according to the criteria of WHO (1997). Results: The prevalence of hypodontia was 4.6%, Females have higher prevalence than males (5.8% females and 3.0% males), ta
... Show MoreQuality of e-service is one of the critical factors that decide the success or failure of organizations. It may increase competitive advantages as well as enhance the relationships with the customers. Achieving high e-service quality and user satisfaction are challenging since they depend fundamentally on user perception and expectation which can be tricky at times. To date, there is no agreement as to what service quality is, and how it should be measured, whether it is a function of statistical measures of quality including physical defects or managerial judgment, or it is a function of customer perception about the services. This paper deep-dived the quality of e-services offered b
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreFacial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreMammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by lo
... Show More