Nuclear shell model is adopted to calculate the electric quadrupole moments for some Calcium isotopes 20Ca (N = 21, 23, 25, and 27) in the fp shell. The wave function is generated using a two body effective interaction fpd6 and fp space model. The one body density matrix elements (OBDM) are calculated for these isotopes using the NuShellX@MSU code. The effect of the core-polarizations was taken through the theory microscopic by taking the set of the effective charges. The results for the quadrupole moments by using Bohr-Mottelson (B-M) effective charges are the best. The behavior of the form factors of some Calcium isotopes was studied by using Bohr-Mottelson (B-M) effective charges.
The objective of this study was to investigate and compare among five different methods of contraception including combined oral contraceptive pills (COC), Depot medroxyprogesterone acetate (DMPA), copper Intrauterine contraceptive device (IUCD), vaginal spermicides and male condom used in Hawler City through estimate of their effect, relative failure rate, percentage of use, adherence and compliance and adverse effects of each contraceptive method. In order to reach to these aims, a retrospective study was conducted in Hawler City in Azadi Health Care Center over a period of 6 months from 22th November, 2010 to 15th May, 2011 during which data collection and subjects follow up for 3 months had been achieved. A conv
... Show MoreA numerical study has been carried out to investigate heat transfer by natural convection and radiation under the effect of magnetohydrodynamic (MHD) for steady state axisymmetric twodimensional laminar flow in a vertical cylindrical channel filled with saturated porous media. Heat is generated uniformly along the center of the channel with its vertical surface remain with cooled constant wall temperature and insulated horizontal top and bottom surfaces. The governing equations which used are continuity, momentum and energy equations which are transformed to dimensionless equations. The finite difference approach is used to obtain all the computational results using the MATLAB-7 programming. The parameters affected on the system are Rayl
... Show MoreAbstract
This study aims to identify the most prominent factors that lead to bullying of students with intellectual disabilities in primary and middle schools from the perspectives of special education teachers. A quantitative descriptive approach was utilized. A questionnaire was used as a tool for data collection. The sample consisted of (72) male and female teachers from the Asir region in the Kingdom of Saudi Arabia. The results revealed the most prominent factors that lead to bullying as follows: factors associated with the school and its policies, factors associated with peers, factors associated with students with intellectual disabilities, and factors associated with general education teachers. The findin
... Show MoreIn the current study, wild land plant specimens were collected during the flowering and fruiting period of these plants in February, April, June, August, and October 2023 from the riparian area of the Dujail River, Salahaldin Province, north of Baghdad, Iraq. Identified and the results showed that the number of these species were: 104 species, belong to 29 plant families, Included 26 dicotyledon families with 76 genera and 96 species. The asteraceae family was the most diverse, with 30 species, followed by Brassicaceae with (12) species. Additionally, there were 13 families represented by only one species in Dujail River which included: Apocynaceae, Berberidaceae, Capparaceae, Caryophyllaceae, Convolvulaceae, Geraniaceae, Lythraceae
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreAbstract: This research was performed to study the effect of some amino acids and vitamins on the growth of bacteria Staphylococcus aureas and its sensitivity against UV light. The results showed low inhibition in bacterial growth because amino acids repairs the damges caused by UV light. Besides the effect of two groups of antibiotics (β-lactame and tetracycline) on the growth of S. aureus and the possible interference of amino acids and vitamins in the activity of the antibiotics against this bacteria in the presence of UV light were studied. The result show increase in the sensitivity towards these antibiotics and provided protection against the antibiotics.
ABSTRACT
This research deals with the two item namely, the monetary policy central Bank of Iraqi and money supply . that contribute in up the problem of the paper that is concerned with the fact that to what extent the effectiveness of monetary policy conducted by the central Bank of Iraqi is valid in controlling money supply as well as the possibility of applying it in practical environment restricted to the scope of financial in stitiutions particularly in research population represented by central Bank of Iraqi .
For the purpose of a practical contribution for monetary and financial institutions . To achieve this , A hypothesis has been carried out and it suggested that the mon
... Show More