Electric Quadrupole transitions are calculated for beryllium isotopes (9, 10, 12 and 14). Calculations with configuration mixing shell model usually under estimate the measured E2 transition strength. Although the consideration of a large basis no core shell model with 2ℏtruncations for 9,10,12 and14 where all major shells s, p, sd are used, fail to describe the measured reduced transition strength without normalizing the matrix elements with effective charges to compensate for the discarded space. Instead of using constant effective charges, excitations out of major shell space are taken into account through a microscopic theory which allows particle–hole excitations from the core and model space orbits to all higher orbits with 2ℏw excitations which are called core-polarization effects. The two body Michigan sum of three ranges Yukawa potential (M3Y) is used for the core-polarization matrix element. The simple harmonic oscillator potential is used to generate the single particle matrix elements of all isotopes considered in this work. The b value of each isotope is adjusted to reproduce the experimental matter radius, These size parameters of the harmonic oscillator almost reproduce all the root mean square (rms) matter radii for 9,10,12,14Be isotopes within the experimental errors. Almost same effective charges are obtained for the neutron- rich Be isotopes which are smaller than the standard values. The major contribution to the transition strength comes from the core polarization effects. The present calculations of the neutron-rich 12,14Beisotopes show a deviation from the general trends in accordance with experimental and other theoretical studies. The configurations arises from the shell model calculations with core-polarization effects reproduce the experimental B(E2) values.
... Show MoreIn this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum
... Show MoreThe graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show MoreThe present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreSamples (4th) reviewed are deposited and stored in the Iraqi Natural History Museum (INHM), and there are 4th of them. Sciurus anomalous (Güldenstädt, 1785) species are preserved and mummified. It is a Caucasian squirrel (S. anomalus) that was medium in size, with a grayish-to-chestnut color, a golden gray back, and a golden tail. It is found in the forests of East and Southeast Asia. The variety possessed for the study was previously registered in the vertebrate literature by several authors and was stored by scientific methods in the museum. As a result of the multiplication and growth of these species, and to know the environmental changes that occurred in them, they were compared with models and samples found throughout Iraq
... Show MoreStudy was done in the period between (2015–2017) in biology department in college of Education for pure science/Ibn Al-Haitham at Baghdad University and in Pathology department/college of medicine at Al-Nahrain University. The study was retrospectively designed. The clinicopathological parameters were obtained from patients’ admission case sheets and pathology reports (age, gender). The presents study included 120 patients having thyroid nodules, classified according to results of histopathology into 4 groups, 30 patients within each; the first group included patients with follicular adenoma, the second group included patients with follicular carcinoma, the third group included patients with follicular variant of papillary carcinoma (FV
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show More