The two-frequency shell model approach is used to calculate the
ground state matter density distribution and the corresponding root
mean square radii of the two-proton17Ne halo nucleus with the
assumption that the model space of 15O core nucleus differ from the
model space of extra two loosely bound valence protons. Two
different size parameters bcore and bhalo of the single particle wave
functions of the harmonic oscillator potential are used. The
calculations are carried out for different configurations of the outer
halo protons in 17Ne nucleus and the structure of this halo nucleus
shows that the dominant configuration when the two halo protons in
the 1d5/2 orbit (15O core plus two protons halo in pure 1d5/2 orbit). The
calculated matter density distribution in terms of the two-frequency
shell model is compared with the calculated one in terms one size
parameter for all orbits to illustrate the effect of introducing one or
two size parameters in calculations. The longitudinal form factors for
elastic C0 and inelastic C2 electron scattering from 17Ne nucleus are
calculated for the considered configurations and for three states of
each configuration which are the ground state ( JT 1 2 3 2 ) and
the first two excited states ( JT 3 2 3 2 ) and ( JT 5 2 3 2 ).
The electric transition strengths B(C2) are calculated for the excited
states and for the effective nucleon charges which are used in this
work and compared with the experimental values.
ABSTRACTBackground: cochlear implants are electronic devices that convert sound energy into electrical signals to stimulate ganglion cells and cochlear nerve fibers. These devices are indicated for patients with severe to profound sensorineural hearing losses who receive little or no benefit from hearing aids. The implant basically takes over the function of the cochlear hair cells. The implant consists of external components (microphone, speech processor and transmitting coil) and internal components (receiver stimulator and electrode array). The implant is inserted via a trans mastoid facial recess approach to the round window and scala tympani.Objectives: to determine the effectiveness and safety of non fixation method in cochlear imp
... Show MoreCorruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Precision is one of the main elements that control the quality of a geodetic network, which defines as the measure of the network efficiency in propagation of random errors. This research aims to solve ZOD and FOD problems for a geodetic network using Rosenbrock Method to optimize the geodetic networks by using MATLAB programming language, to find the optimal design of geodetic network with high precision. ZOD problem was applied to a case study network consists of 19 points and 58 designed distances with a priori deviation equal to 5mm, to determine the best points in the network to consider as control points. The results showed that P55 and P73 having the minimum ellipse of error and considered as control points. FOD problem was applie
... Show MoreThe present study investigated Haematological changes in Mesopotamichthys sharpeyi, as well as determination genotoxic effects of cadmium chloride on bunni fish by using 120 fingerlings, fish were distributed randomly into four treatments in addition to control group. Fish in first group treated (T1) with cadmium 0.093mg/L with changing water and added cadmium continuously, fish in the second group treated (T2) with cadmium 0.093mg/L with changing water without adding cadmium, third treatment (T3) with cadmium 0.046mg/L with changing water and adding cadmium continuously, and fourth treatment (T4) with cadmium 0.046mg/L with changing water without adding cadmium. Results of blood picture in T1 and T3 showed a significant reduction in red bl
... Show MoreI have studied the relationship between blood groups in humans and disease Cutaneous injury for the first time in Iraq study showed the presence of a significant statistical relationship between them leather Bmsoy in hospitals in Baghdad and its suburbs
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More