Electric Quadrupole transitions are calculated for beryllium isotopes (9, 10, 12 and 14). Calculations with configuration mixing shell model usually under estimate the measured E2 transition strength. Although the consideration of a large basis no core shell model with 2ℏtruncations for 9,10,12 and14 where all major shells s, p, sd are used, fail to describe the measured reduced transition strength without normalizing the matrix elements with effective charges to compensate for the discarded space. Instead of using constant effective charges, excitations out of major shell space are taken into account through a microscopic theory which allows particle–hole excitations from the core and model space orbits to all higher orbits with 2ℏw excitations which are called core-polarization effects. The two body Michigan sum of three ranges Yukawa potential (M3Y) is used for the core-polarization matrix element. The simple harmonic oscillator potential is used to generate the single particle matrix elements of all isotopes considered in this work. The b value of each isotope is adjusted to reproduce the experimental matter radius, These size parameters of the harmonic oscillator almost reproduce all the root mean square (rms) matter radii for 9,10,12,14Be isotopes within the experimental errors. Almost same effective charges are obtained for the neutron- rich Be isotopes which are smaller than the standard values. The major contribution to the transition strength comes from the core polarization effects. The present calculations of the neutron-rich 12,14Beisotopes show a deviation from the general trends in accordance with experimental and other theoretical studies. The configurations arises from the shell model calculations with core-polarization effects reproduce the experimental B(E2) values.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAbstract
Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,
This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted
... Show MoreA localized stenosis or aneurysm is a discontinuity that presents the pulse wave produced by the contracting heart with a reflection site. However, neither wave speed ( c) in these discontinuities nor the size of reflection in relation to the size of the discontinuity has been adequately studied before. Therefore, the aim of this work is to study the propagation of waves traversing flexible tubes in the presence of aneurysm and stenosis in vitro. We manufactured different sized four stenosis and four aneurysm silicone sections, connected one at a time to a flexible ‘mother’ tube, at the inlet of which a single semi-sinusoidal wave was generated. Pressure and velocity were measured simultaneously 25 cm downstream the inlet of th
... Show MoreThis study aims to find out the effect of the mediator on scaffolding fourth yearstudent- teachers' teaching competencies and their self-efficacy. The present study combines scaffolding and self-efficacy by using a mediator on scaffolding students affects teaching competencies and selfefficacy and from the results of which the existence of student-teachers’ selfawareness was ensured as an effect of the same independent variable. The model affects their teaching competencies and led them to be aware of the needs of their pupils and themselves.
Background: Corn Syrup is food syrup higher of carbohydrate, depending on grade. The study aimed to assess efficiency of Corn syrup as cytological fixative.
Subjects and methods: This was laboratory based study, it has been conducted at Elrazi University included apparently 30 healthy students have been involved in this study.
Results: Out of 30 smears fixed with 95% alcohol, 76.7% (n=23) shows excellent nuclear stain, 23.3% (n= 7) shows good nuclear stain. 70% (n=21) show excellent cytoplasmic stain, 26.7% (n=8) shows good cytoplasmic stain, 3.3% (n=1) shows poor cytoplasmuc stain.
Out of 30 smears fixed with corn solution, 60
... Show MoreAbstract
In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications in order to get mean square error and used it to make compare , simulation experiment contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif
... Show MoreA prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThe importance of the study, which is how to use these exercises with the device in rehabilitating the flabby muscles after childbirth, which is a problem found in our society and in need of high education on it because the form of exercises does not need places designated for training such as halls or fitness halls, especially since the social woman has limited movement in which we see the responses Physiology in different ways, the woman’s body is not only subject to the day’s need for work or the need to complete hours of physical training, but she has feminist components that she must overcome, whether it is physiological or otherwise.The research sample was determined by the intentional method available from women whose age
... Show More