The effect of short range correlations on the inelastic longitudinal Coulomb form
factors for the lowest four excited 2+ states in 18O is analyzed. This effect (which
depends on the correlation parameter β) is inserted into the ground state charge
density distribution through the Jastrow type correlation function. The single particle
harmonic oscillator wave function is used with an oscillator size parameter b. The
parameters β and b are, considered as free parameters, adjusted for each excited state
separately so as to reproduce the experimental root mean square charge radius of
18O. The model space of 18O does not contribute to the transition charge density. As
a result, the inelastic Coulomb form factor of 18O comes absolutely from the core
polarization transition charge density. According to the collective modes of nuclei,
the core polarization transition charge density is assumed to have the form of Tassie
shape. It is found that the introduction of the effect of short range correlations is
necessary for obtaining a remarkable modification in the calculated inelastic
longitudinal Coulomb form factors and considered as an essential for explanation the
data amazingly throughout the whole range of considered momentum transfer.
PACS: 25.30.Dh; 21.60.Cs; 27.20.+n
Background: One of the most common and prevalent oral diseases among adolescents is periodontal disease particularly gingivitis, however enamel anomalies and dental trauma could occur. Aims of the study: This study was conducted among 14-15 years intermediate school male students in urban area of Al-Khalis city to assess the oral hygiene (dental plaque) and to estimate the prevalence and severity of gingivitis, enamel anomalies, as well as traumatic dental injuries, furthermore to show the significant difference between these two ages concerning these oral problems. Materials and methods: In this study the total sample consisted of 735 students (397 aged 15 years and 338 aged 14 years ). In present study dental plaque was recorded accord
... Show MoreThis study focused on the expression and regulation of BRCA1 in breast cancer cell lines compared to normal breast. BRCA1 transcript levels were assessed by real time quantitative polymerase chain reaction (RT-qPCR) in the cancer cell lines. Our data show overexpression of BRCA1 mRNA level in all the studied breast cancer cell lines: MCF-7, T47D, MDA-MB-231 and MDA-MB-468 along with Jurkat, leukemia T-lymphocyte, the positive control, relative to normal breast tissue. To investigate whether a positive or negative correlation exists between BRCA1 and the transcription factor E2F6, three different si-RNA specific for E2F6 were used to transfect the normal and cancerous breast cell lines. Interestingly, strong negative relationship was found b
... Show MoreAvascular necrosis have always presented great challenges to orthopedic surgeons and patients, remain in many ways today the unsolved dilemma. Varieties of non-vascularized bone grafting techniques preceded by core decompression have been proposed with varying degrees of success. O bb j ee cc t i vv ee ss : The aim of this study is to review the the value of core decompression and non-vascularized tibial bone strip graft treatment for early stages of non-traumatic osteonecrosis stage II & III according to stein burg staging . M ee t hh oo dd ss : prospectively reviewed 26 patients (32 hips) with osteonecrosis of the femoral head between June 2006 and December 2013 at Imam Ali hospital in Sader city & Al-Wasity teaching hosp
... Show More The research addresses the feminist lament and its representations in the contemporary Arab theatrical text as one of the purposes of the Arabic poetry and its images, samples, and reasons developed and its incentives multiplied through different time periods in which a dramatic image and representations have been manifested that harmonized with the art of theatre. In order to shed light on these representations, this study has come to look for the representations of lament phenomenon in the Arab theatre texts.
The study consists of an introduction in which the two researchers put forward the research problem, significance and objectives, and a theoretical framework which tackles a theoretical foundation for the research consi
A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were st
... Show MoreChannel estimation (CE) is essential for wireless links but becomes progressively onerous as Fifth Generation (5G) Multi-Input Multi-Output (MIMO) systems and extensive fading expand the search space and increase latency. This study redefines CE support as the process of learning to deduce channel type and signal-tonoise ratio (SNR) directly from per-tone Orthogonal Frequency-Division Multiplexing (OFDM) observations,with blind channel state information (CSI). We trained a dual deep model that combined Convolutional Neural Networks (CNNs) with Bidirectional Recurrent Neural Networks (BRNNs). We used a lookup table (LUT) label for channel type (class indices instead of per-tap values) and ordinal supervision for SNR (0–20 dB,5-dB steps). T
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
KE Sharquie, AA Al-Bayatti, AI Al-Ajeel, AJ Al-Bahar, AA Al-Nuaimy, Saudi medical journal, 2007 - Cited by 63
The aim of study was making comparison in some kinematics variables in (100) meter butterfly swimming to first and second ranking in championship 2003 Espana, so noticed there is no such like this study in our country in comparison study for international champions therefore not specific and scientific discovering to these advanced levels, also the researchers depend on group of kinematics variables when the comparison making and it was included (50 meter the first, 50 meter the second, the differences between the first (50) meter and the second , more over basic variables in (100) meter butterfly , after having the results and treat it statistically the researchers reaches to two conclusions which was: • Success the first rank in startin
... Show More