In this work, the Whittaker wave functions were used to study the nuclear density distributions and elastic electron scattering charge form factors for proton-rich nuclei and their corresponding stable nuclei (10,8B, 13,9C, 14,12N and 19,17F). The parameters of Whittaker’s basis were fixed to generate the experimental values of available size radii. The Whittaker basis was connected to harmonic-oscillator basis through boundary condition at match point. The nuclear shell model was opted with pure configuration for all studied nuclei to compute aforementioned studied quantities except 10B. For 10B, the total spin is 3+, therefore, there is a C2 component in empirical Coulomb form factor in addition to C0 component. The theory of core-polarization was applied to account such C2 contribution using Tassie, Bohr-Mottelson and valence models. The contribution of model space to C2 component was computed using Cohen-Kurath interaction. For exotic 8B, 9C, 12N and 17F nuclei, the Whittaker’s basis was applied only to the last exotic valence proton, on contrary to stable 10B, 13C, 14N and 19F which the Whittaker’s basis was applied to both last stable valence proton and neutron . It was seen that such treatment highly improved the calculated quantities in comparison with empirical data.
This research includes structure interpretation of the Yamama Formation (Lower Cretaceous) and the Naokelekan Formation (Jurassic) using 2D seismic reflection data of the Tuba oil field region, Basrah, southern Iraq. The two reflectors (Yamama and Naokelekan) were defined and picked as peak and tough depending on the 2D seismic reflection interpretation process, based on the synthetic seismogram and well log data. In order to obtain structural settings, these horizons were followed over all the regions. Two-way travel-time maps, depth maps, and velocity maps have been produced for top Yamama and top Naokelekan formations. The study concluded that certain longitudinal enclosures reflect anticlines in the east and west of the study ar
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreCancer stem cells (CSCs) are defined as a population of cells present in tumours, which can undergo self-renewal and differentiation. Identification and isolation of these CSCs using putative surface markers have been a priority of research in cancer. With this background we selected pancreatic normal and tumor cells for this study and passaged them into animal tissue culture medium. Further staining was done using alkaline phosphatase and heamatoxilin staining. Blue to purple colored zones in undifferentiated pluripotent stem cells and clear coloration in the chromatin material indicated pancreatic cells. Further studies on the cell surface marker CD 44 were done using ELISA. For this, the protein was extracted from cultivated normal and t
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
In the present work, we use the Adomian Decomposition method to find the approximate solution for some cases of the Newell whitehead segel nonlinear differential equation which was solved previously with exact solution by the Homotopy perturbation and the Iteration methods, then we compared the results.
A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga
... Show More