The two-frequency shell model approach is used to calculate the
ground state matter density distribution and the corresponding root
mean square radii of the two-proton17Ne halo nucleus with the
assumption that the model space of 15O core nucleus differ from the
model space of extra two loosely bound valence protons. Two
different size parameters bcore and bhalo of the single particle wave
functions of the harmonic oscillator potential are used. The
calculations are carried out for different configurations of the outer
halo protons in 17Ne nucleus and the structure of this halo nucleus
shows that the dominant configuration when the two halo protons in
the 1d5/2 orbit (15O core plus two protons halo in pure 1d5/2 orbit). The
calculated matter density distribution in terms of the two-frequency
shell model is compared with the calculated one in terms one size
parameter for all orbits to illustrate the effect of introducing one or
two size parameters in calculations. The longitudinal form factors for
elastic C0 and inelastic C2 electron scattering from 17Ne nucleus are
calculated for the considered configurations and for three states of
each configuration which are the ground state ( JT 1 2 3 2 ) and
the first two excited states ( JT 3 2 3 2 ) and ( JT 5 2 3 2 ).
The electric transition strengths B(C2) are calculated for the excited
states and for the effective nucleon charges which are used in this
work and compared with the experimental values.
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show MoreSAGD is a thermal recovery process in which steam oil ratio, SOR, is a key parameter that can affect the economic outcome of the process. Reservoirs with underlying or overlying lean bitumen present challenges for SAGD as they can act as a heat sink. Water has higher heat capacity than the bitumen and thus requires more steam to heat up the reservoir leading to higher SOR. The potential outcome of operating SAGD in these conditions may be lower bitumen rate and higher steam injection rate, both of which affect plant throughput and thus the economic matrix of SAGD. This paper looks at the performance of SAGD process in the presence of top lean bitumen. It will examine the theoretical CSOR that is needed to produce the bitumen with different
... Show MoreDry gas is considered one of the most environmentally friendly sources of energy. As a result, developing an efficient strategy for storing this gas has become essential. In this work, MOF-199 was synthesized and characterized in order to investigate the MOF-199 in dry gas adsorption using a built-in volumetric system (methane, ethane, and propane from Basrah gas company). The MOF-199 (metal organic framework) was synthesized using the solvothermal method at 373K for 24h, and then it was characterized. The dry gas adsorption on MOF-199 was studied under various conditions (adsorbent dosage, contact time, temperature, and pressure). The isothermal adsorption of the dry gas had been studied on MOF-199 using two types of mo
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreAll domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work
Over the past ten years, tumor markers have played an increasingly important role in clinicaloncology. This trend is expected to continue as technology advances and our knowledge of thehuman body and disease processes grows. In the treatment of cancer, tumor markers are widelyused for a variety of purposes, including screening, selecting a management strategy,determining the prognosis, and post-therapy follow-up. A comprehensive of the fundamentalsof pathophysiology and identification strategies for each specific malignancy is necessary fortheir prudent application in clinical practice. Oncology's use of cancer biomarkers hastransformed the way that cancer is treated, and led to notable improvements in patient outcomesand cancer tre
... Show Morehemorrhagic fever (VHF), one of which is Filoviridae. The Filoviridae family includes the Ebola virus , is responsible for the current VHF outbreak in West Africa. Viral hemorrhagic fevers (VHFs) occur in various regions around the world, yet traditional diagnostic testing for these diseases has typically been conducted in major reference laboratories located in Europe and the United States. In this review, we explore the current understanding of the mechanisms driving the pathogenesis of viral hemorrhagic fevers (VHFs) and examine the progress in developing preventive and therapeutic strategies for these infections.
This research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show Moreكان لنهاية الحرب الباردة وعولمة العالم على وفق رؤية كونية تتجاوز حدود ومفاهيم السيادة الوطنية والقومية الاثر الواضح في ترتيب العلاقات الدولية , واصبحت تلك العلاقات تدور حول محورين الاول .. هو الاعتماد المتبادل بين الدول من اجل الوصول الى خطوط مشتركة للمصالح المختلفة بين هذه الدول . والآخر.. هو تبعية الدول الضعيفة للدول القوية لافتقار الاولى توفير الحاجيات الى مواطنيها . هذا يشير الى نشأة علا
... Show More