An effective two-body density operator for point nucleon system
folded with the tenser force correlations( TC's), is produced and used
to derive an explicit form for ground state two-body charge density
distributions (2BCDD's) applicable for 25Mg, 27Al and 29Si nuclei. It is
found that the inclusion of the two-body TC's has the feature of
increasing the central part of the 2BCDD's significantly and reducing
the tail part of them slightly, i.e. it tends to increase the probability of
transferring the protons from the surface of the nucleus towards its
centeral region and consequently makes the nucleus to be more rigid
than the case when there is no TC's and also leads to decrease the
1/ 2
r 2 of the nucleus. It is also found that the effect of the TC's and the
effect of increasing the values of on the 2BCDD's, elastic
electron scattering form factors and r2 1/ 2 are in the same direction
for all considered nuclei.
The aim of this work is to learn the relationship of the stability of (β) emitter isobars with their shape for some isobaric elements with even mass number (A=152 - 162). To reach this goal firstly the most stable isobar have been determined by plotting mass parabola (plotting the binding energy (B.E) as a function of the atomic number (Z)) for each isobaric family. Then three-dimensional representation graphics for each nucleus in these isobaric families have been plotted to illustrate the deformation in the shape of a nucleus. These three-dimensional representation graphics prepared by calculating the values of semi-axis minor (a), major (b) and (c) ellipsoid axis’s. Our results show that the shape of nuclides which is represented the
... Show MoreThe relationship between prey and predator populations is hypothesized and examined using a mathematical model. Predation fear, cannibalism among the prey population, and a refuge reliant on predators are predicted to occur. This study set out to look at the long-term behavior of the proposed model and the effects of its key elements. The solution properties of the model were investigated. All potential equilibrium points' existence and stability were looked at. The system's persistence requirements were established. What circumstances could lead to local bifurcation near equilibrium points was uncovered. Suitable Lyapunov functions are used to study the system's overall dynamics. Numerical simulations were conducted to verify the
... Show MoreAbstract:
The six Arab Gulf states (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, UAE) play a vital role, especially with its geographical location and natural resources (oil and gas) as well as other cultural and civilizational elements, in achieving global economic balance and more specifically global energy security, naturally because of these countries have a comparative advantage in the field of fossil energy (oil and gas), thus this sector becomes more attractive for local and international investments alike. Being the energy sector a leader sector in the economic development process, and the basic factor to achieve savings and financial surpluses in thes
... Show MoreThe literature shows conflicting outcomes, making it difficult to determine how e-learning affects the performance of students in higher education. The effect of e-learning was studied and data has been gathered with the utilization of a variety of qualitative and quantitative methods, especially in relation to students' academic achievements and perceptions in higher education, according to literature review that has been drawn from articles published in the past two decades (2000-2020). The development of a sense of community in the on-line environment has been identified to be one of the main difficulties in e-learning education across this whole review. In order to create an efficient online learning community, it could be claim
... Show MoreInformation centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show MoreThe problem of the research lies in special motor abilities training programs like the balance that positively affect coordination between the nervous system and muscles. These training programs did not get enough attention from athletes especially young athletes; their training was restricted to physical abilities like strength, speed, and endurance instead. The research aimed at designing an apparatus for developing athletes’ balance in national centers for gifted/ ministry of youth and sport so as to provide a measurement for coached in this field. The results showed that the designed apparatus have a positive effect on developing the subjects’ balance in boxing and basketball athletes.