The ground state proton, neutron and matter densities and
corresponding root mean square radii of unstable proton-rich 17Ne
and 27P exotic nuclei are studied via the framework of the twofrequency
shell model. The single particle harmonic oscillator wave
functions are used in this model with two different oscillator size
parameters core b and halo , b the former for the core (inner) orbits
whereas the latter for the halo (outer) orbits. Shell model calculations
for core nucleons and for outer (halo) nucleons in exotic nuclei are
performed individually via the computer code OXBASH. Halo
structure of 17Ne and 27P nuclei is confirmed. It is found that the
structure of 17Ne and 27P nuclei have 2
5 / 2 (1d ) and 1/ 2 2s -dominant
configurations, respectively. Elastic electron scattering form factors
of these exotic nuclei are also studied using the plane wave Born
approximation. Effects of the long tail behavior of the proton density
distribution on the proton form factors of 17Ne and 27P are
analyzed. It is found that the difference between the proton form
factor of 17Ne and that of stable 20Ne (or of 27P and that of stable
31P) comes from the difference in the proton density distribution of
the last two protons (or of the last proton) in the two nuclei. It is
concluded that elastic electron scattering will be an efficient tool (in
the near future) to examine proton-halo phenomena of proton-rich
nuclei.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show MoreLet R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes
Background: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c
... Show MoreThe aim of the research is to demonstrate the impact of the dimensions of the marketing vigilance represented by (environmental scanning, diagnostic capacity, validity and decision-making) and to attract deposits represented by (customer relationship management strategy, distribution strategy (location), promotion strategy), as the research was applied in each of Banks (Assyria International, Iraqi Middle East Investment, Business Bay, Iraqi Investment, Babel, Al Mansour Investment), and the questionnaire was adopted as a main tool for collecting data and information from a sample of (110) who are in the position (department manager, department manager, assistant Section Director, Division Officer, Unit Officer), and the statistical prog
... Show More
This paper analyses the relationship between selected macroeconomic variables and gross domestic product (GDP) in Saudi Arabia for the period 1993-2019. Specifically, it measures the effects of interest rate, oil price, inflation rate, budget deficit and money supply on the GDP of Saudi Arabia. The method employs in this paper is based on a descriptive analysis approach and ARDL model through the Bounds testing approach to cointegration. The results of the research reveal that the budget deficit, oil price and money supply have positive significant effects on GDP, while other variables have no effects on GDP and turned out to be insignificant. The findings suggest that both fiscal and monetary policies should be fo
... Show MoreBackground: Fractures of the humeral shaft
accounting for approximately 3% of all
fractures. There is a wide array of good
options for their treatment and controversy
over the best methods. Although good
techniques of osteosynthesis are available, the
aim of this article is toemphasize on the benefit
and good outcome of conservative treatment
for properly selected cases to decrease the cost
and avoid the complications of surgery.
The concept of education is not actually restricted to children or school students, but rather every person should be educated and followed up if he is intended to grow and prove, with effort and time allocation as to fulfill that goal. Thus , the current paper aims to a thinking education and to educate that thinking in teacher and it is not new to deal with the personal characteristics of teacher in the different scientific , and educational researches . But ,these research did not address the necessity of acquiring the skill of thinking, especially as it affects teacher's presentation of the content of the curriculum or even content outside the curriculum, and therefore, there is n
... Show More