The charge density distributions (CDD) and the elastic electron scattering form factors, F(q), of the ground state for some 1f-2p shell nuclei, such as 74Ge, 76Ge, 78Se and 80Se nuclei have been calculated based on the use of occupation numbers of the states and the single particle wave functions of the harmonic oscillator potential with size parameters chosen to reproduce the observed root mean square charge radii for all considered nuclei. It is found that introducing additional parameters, namely β1 and β2 which reflect the difference of the occupation numbers of the states from the prediction of the simple shell model leads to a remarkable agreement between the calculated and experimental results of the charge density distributions throughout the whole range of r. The calculated elastic electron scattering form factors from 74Ge, 76Ge, 78Se and 80Se nuclei are very good agreement with the fitted to the experimental data throughout all values of q.
The primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes
The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreIn this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum
... Show MoreMost medical books and researches documented that increased body weight is a predisposing factor to hypertension , and there is recent work in this field as well. In this research , the relationships between hypertension and body weight with age were studied in Iraqi population . It is concluded that diastolic hypertension is separated from systolic and combined hypertension and increased body weight has little effect on increased blood pressure.
Publication and edition of two tablets from the library in the Ebabbar Temple of Sippar, a manuscript of the ‘Babylonian Poem of the Righteous Sufferer’ (
BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files con
... Show MoreIraq has the distinction of being a great potential of non-renewable natural resources,
especially crude oil and natural gas. Since the discovery of crude oil at the beginning of the
twentieth century in Iraq. Although the different of investment types, it contributed to the oil
sector in the provision of financial resources to the state treasury , since that date until the
present time.
Search has been marked by division ((The foreign investment in the oil sector in Iraq after
2003)) into three sections. The first section included a brief history of the development of
Iraq's oil potential in terms of oil reserves, and oil fields, and the quantities of production and
export. The second section reviewed the investm
The present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).