Random matrix theory is used to study the chaotic properties in nuclear energy spectrum of the 24Mg nucleus. The excitation energies (which are the main object of this study) are obtained via performing shell model calculations using the OXBASH computer code together with an effective interaction of Wildenthal (W) in the isospin formalism. The 24Mg nucleus is assumed to have an inert 16O core with 8 nucleons (4protons and 4neutrons) move in the 1d5/2, 2s1/2 and 1d3/2 orbitals. The spectral fluctuations are studied by two statistical measures: the nearest neighbor level spacing distribution
The main objective and primary concern to every investor not only to achieve a greater return on his or her investments, but also to create the largest possible value of these investments the, researchers and those interested in the field of investment and financial analysis try to develop standards for performance valuation is guided through the  
... Show MoreThis Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th
... Show MoreOne of the contemporary trends in education and training is the use of educational, competitive and digital games, because one of the most important goals of games is (motivation and challenge). Thus, it ensures the expected reaction from the recipient’s interaction with the game, so we seek his interaction with the content he receives. It is no secret that games distance him from boring content and introduce him to the world of motivation by integrating them with magical elements that make an attractive and desirable game. Naturally, in the case of stimuli and motives that activate the recipient within the context of the educational process procedures, the return is high and especially enjoyable. The aim of the research is to pre
... Show MoreThe issue of the public in the directions and theories of the theater director in the world theater, especially after the emergence of realism and the crystallization of the term direction and the definition of the role of the director in 1850 AD by the Duke Max Mengen took different paths to the Greek, Roman and even Elizabethan audience because it was here subjected to the theatrical equation from its production and presentation due to the fact that the theatrical performance is a technical artistic production, and the audience participation, watching and consumption, and here the participation of the audience was subjected to three directions: the enlightenment in the sense of arousing sense, the incitement in the se
... Show MoreThis paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreNew metal ions complexes of tridentate ligand (1-((dicyclohexylamino) methyl)-3-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrzol-4-ylimino) indolin-2-one) have been synthesized and characterized by chemical-physical analysis. The ligand acts as a tridentate for the complexation reaction with all metal ions. The new complexes, possessing the general formula [M(L)Cl]Cl where M=[Ni(II), Cu(II), Zn(II), Pd(II), Cd(II), Pt(IV) and Hg(II) ] ,show tetrahedral geometry. All complexes ,except Pd(II) complex which has a square planar geometry and Pt(IV) which show an octahedral geometry. The geometry of the prepared compounds has been proposed in another method theoretically by using one of the calculation molecular programs (Hype
... Show MoreAzo dye ligand was produced by coupling the diazonium salt of 4aminoantipyrine with 2, 4-dimethylphenol. The structure of 1 azo compound was someone by elemental analyses, HNMR, FT-IR and UV-Vis spectroscopic mechanics. Metal complexes of nickel (II) and copper (II) have been performed and depicted. The formation of complexes has been identified by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectral process as well as, conductivity and magnetic properties quantifications. The nature of the complexes formed were studied succeed the mole ratio and continuous variation methods, Beer's law followed over a concentration 4 4 scope (1×10- - 3×10- M). High molar absorbtivity of the complex solutions were observed. Analytica
... Show More