The nuclear density distributions and size radii are calculated for one-proton 8B, two-proton 17Ne, one-neutron 11Be and two-neutron 11Li halo nuclei. The theoretical outlines of calculations assume that the nuclei understudy are composed of two parts: the stable core and the unstable halo. The core part is studied using the radial wave functions of harmonic-oscillator (HO) potentials, while the halo is studied through Woods-Saxon (WS) potential. The long tail behaviour which is the main characteristic of the halo nuclei are well generated in comparison with experimental data. The calculated size radii are in good agreement with experimental values. The elastic electron scattering form factors of the C0 component are also calculated for the aforementioned nuclei. The calculated form factor results give predictions for the results of future experiments on electron-radioactive ion beam colliders.
In the present research is marked (expressive drawing in contemporary Iraq, the study of morphological features) eating expressive as the direction of modern art in the drawing for the period before and after World Wars I and II. And follow the tracks. And in research and investigation about the origins and sources and characteristics of expressionist painting at adult patrons and art gatherings, and the extent of their impact in the drawing for contemporary Iraqi sixties and seventies generation (generation of professors) and down to the younger generation in the eighties of the last century. Over the nearly two decades of history of fine movement in Iraq, a period specified in the search within the limits of temporal boundaries, and by
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreThe problem of the research is focused on importance limited of Iraq industrial companies in application of scientific measurements of supply chains performance, The research sought to achieve a group of goals, the most important are , identifying the strengths and weaknesses in the reality of supply chain in General Company for Cotton Industries, The data and information required are gathered from the dependence company, records through the field observations and personal interviews, the research used some quantitative indicators to measure of supply chain performance, The research reached to many conclusions , the most outstanding among them is the existence of a strong inverse correlatio
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
This paper presents a comparative study between different oil production enhancement scenarios in the Saadi tight oil reservoir located in the Halfaya Iraqi oil field. The reservoir exhibits poor petrophysical characteristics, including medium pore size, low permeability (reaching zero in some areas), and high porosity of up to 25%. Previous stimulation techniques such as acid fracturing and matrix acidizing have yielded low oil production in this reservoir. Therefore, the feasibility of hydraulic fracturing stimulation and/or horizontal well drilling scenarios was assessed to increase the production rate. While horizontal drilling and hydraulic fracturing can improve well performance, they come with high costs, often accounting for up t
... Show MoreThe study objectives were to (1) describe the characteristics of the pharmacy professionals and (2) explore the association between job satisfaction and factors, such as work control, work stress, workload and organization and professional commitments.
This study was a cross-sectional design. The survey items were mainly adapted from the US National Pharmacist Workforce Survey. An electronic (Qualtrics) questionnaire was posted on pharmacist social media in several A
Background:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show More