The challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum 〈L〉 for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A quantum Coupled-Channel Calculations are performed using CC code. The predictions of quantum mechanical approach are comparable with the measured data that is available. Above and below the Coulomb barrier, comparison of theoretical calculations of quantum mechanical with the relevant measured data demonstrates good agreement.
The research aims to reach a set of objectives concerning creation a clear vision about conceptual, philosophical and practical dimension of relations, and effects between knowledge management, costumer orientation and competitiveness to construct a framework of a pragmatic model as a solution to research problem and its questions which the main one is about the role of knowledge management and costumer orientation in competitiveness of business organizations. To achieving this goal, it was necessary to make, in priory, a review and discussion to the theoretical dimension of research variables to have a clear vision about constructing hypostatical research model implying a set of hypotheses which, by proving them in companies studied, repr
... Show MoreThe research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreThe aim of this study is to highlight the relationship between competitive intelligence and Entrepreneurial Performance by centralizing the strategic vigilance of a sample of civil faculties in Baghdad. The sample of the study was targeted at 10 Iraqi civil colleges, which consisted of (133) members of the faculty council of the faculties, the search data was collected using the questionnaire form as the main research tool. The results showed that the correlation and influence of competitive intelligence and strategic vigilance in the Entrepreneurial Performance, as well as the role of strategic vigilance as an intermediate variable between competitive intelligence and Entrepreneurial Performance.
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreThis dissertation depends on study of the topological structure in graph theory as well as introduce some concerning concepts, and generalization them into new topological spaces constructed using elements of graph. Thus, it is required presenting some theorems, propositions, and corollaries that are available in resources and proof which are not available. Moreover, studying some relationships between many concepts and examining their equivalence property like locally connectedness, convexity, intervals, and compactness. In addition, introducing the concepts of weaker separation axioms in α-topological spaces than the standard once like, α-feebly Hausdorff, α-feebly regular, and α-feebly normal and studying their properties. Furthermor
... Show Morein this work many amide polymers were prepared according to the modification reaction of polyacryloyl chloride or poluacrulic acid with different primary amines to mesuringninizing hormone were investgaited prior tq surgery in 10 postmenopaisal women with benign and 10 postmenopausal women with maliganant healthy
Suppose R has been an identity-preserving commutative ring, and suppose V has been a legitimate submodule of R-module W. A submodule V has been J-Prime Occasionally as well as occasionally based on what’s needed, it has been acceptable: x ∈ V + J(W) according to some of that r ∈ R, x ∈ W and J(W) an interpretation of the Jacobson radical of W, which x ∈ V or r ∈ [V: W] = {s ∈ R; sW ⊆ V}. To that end, we investigate the notion of J-Prime submodules and characterize some of the attributes of has been classification of submodules.
In this research, a new application has been developed for games by using the generalization of the separation axioms in topology, in particular regular, Sg-regular and SSg- regular spaces. The games under study consist of two players and the victory of the second player depends on the strategy and choice of the first player. Many regularity, Sg, SSg regularity theorems have been proven using this type of game, and many results and illustrative examples have been presented
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.