The possible effect of the collective motion in heavy nuclei has been investigated in the framework of Nilson model. This effect has been searched realistically by calculating the level density, which plays a significant role in the description of the reaction cross sections in the statistical nuclear theory. The nuclear level density parameter for some deformed radioisotopes of (even- even) target nuclei (Dy, W and Os) is calculated, by taking into consideration the collective motion for excitation modes for the observed nuclear spectra near the neutron binding energy. The method employed in the present work assumes equidistant spacing of the collective coupled state bands of the considered isotopes. The present calculated results for first excited rotational band have been compared with the accumulated values from the literature for s-wave neutron resonance data, and were in good agreement with those data.
This study aims to discuss how English Language Textbook (ELT), used in Iraqi schools, can be developed. All Iraqi teachers in Iraq spend much time using ELT textbooks in classrooms, and most of the Iraqi students depend on these textbooks to learn and improve the English language, so choosing an appropriate ELT textbook is so essential. A suitable book must include critical components that fit teachers' and students' needs. The quality of ELT textbooks has been improved dramatically in recent years, even though these textbooks still do not meet students' needs, especially in language communication skills. This study seeks to investigate the most critical components that may make the ELT textbooks are more influential and interactive for Ir
... Show MoreThe book gives details about the healing power of love
Low incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t
Magic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .
Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th
... Show MoreThe metric dimension and dominating set are the concept of graph theory that can be developed in terms of the concept and its application in graph operations. One of some concepts in graph theory that combine these two concepts is resolving dominating number. In this paper, the definition of resolving dominating number is presented again as the term dominant metric dimension. The aims of this paper are to find the dominant metric dimension of some special graphs and corona product graphs of the connected graphs and , for some special graphs . The dominant metric dimension of is denoted by and the dominant metric dimension of corona product graph G and H is denoted by .
The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show More