The basic analytical formula for particle-hole state densities is derived based on the non-Equidistant Spacing Model (non-ESM) for the single-particle level density (s.p.l.d.) dependence on particle excitation energy u. Two methods are illustrated in this work, the first depends on Taylor series expansion of the s.p.l.d. about u, while the second uses direct analytical derivation of the state density formula. This treatment is applied for a system composing from one kind of fermions and for uncorrected physical system. The important corrections due to Pauli blocking was added to the present formula. Analytical comparisons with the standard formulae for ESM are made and it is shown that the solution reduces to earlier formulae providing more general way to calculate state density. Numerical calculations then are made and the results show that state density behavior with excitation energy deviates from Ericson’s and Williams’ formulae types, especially at higher excitation energies
The university press is an essential pillar in building an academic community to achieve its objectives in the service of society. Since the university press is a means of university media, which is issued by the departments or units of media in Iraqi universities as academic governmental-institutions, so it highlights the activities of the university and link them to its internal society in the first place as the university press is a mirror of the university and its voice is sincerely expressed. This research comes to know the extent of interest of the university press in various student issues.
In order to identify the problem of the research, the method of content analysis was adopted within the survey method
... Show MoreContracting companies play a prominent role today in economic activity, due to their contribution to the implementation of major construction projects which together constitute the infrastructure of society. Most construction projects also suffer from exceeding the time and cost specified and planned for the completion of the project, and this comes for several reasons, including the work environment, country conditions, The method of managing project costs and the techniques used in its implementation Accordingly, the concepts of lean construction came, which help in addressing the causes of waste, both in time and cost, in addition to the fact that project management needs techniques that are useful in controlling the control and manag
... Show MoreThe modernity of election practices of the elections in Iraq, according to the democratic approach, has led to a struggle between political rival forces reflecting a deep pressure on the tools involved in the management, marketing or control of these elections across the general social level. Hence the problem of research resides in answering the following question: What is the nature and size of the pressures affecting the media performance of Al-Iraqia News channel before the legislative elections of 2018 in Iraq?
The objectives of the research were the following:
1. to identify the nature of the pressures that limit the Al-Iraqia News channel’s perfo
Often requires the investor to know the result of the company's activity contribute to the investor or by wanting to invest in them because profit or loss of the company affect positively or negatively in the price of shares of the company and with the end of the fiscal year delayed companies often to issue its financial statements after it is approved and audited by an observer External Auditor, From here came the idea of research that appears to stakeholders of financial statements proactive appear, including actual figures for earlier stages have been prepared lists about lists and planned by the administration reflect the results of its phase remainder of the year as if they are (half a year or season or month) to offer At the
... Show MoreThe research aimed mainly to discover the effectiveness of the (PEOE) model in teaching science to develop the skills of generating and evaluating information and the emotional side of the scientific sense of the intermediate first grade students. An experimental approach with a quasi-experimental design called pre-test and post-test control design was used. The research sample consisted of (60) students, who were selected in a random cluster method, (30) students in the experimental group studied the unit "The Nature of Material" using the (PEOE) model, and (30) students in the control group studied according to the prevailing method of teaching. The research materials and tools were represented in: a teacher's guide for teaching the un
... Show MoreBackground: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos