Preferred Language
Articles
/
zxj9T5QBVTCNdQwCPQTw
An Analysis of the Tensor Force and Pairing Correlation on the Disappearance of Nuclear Magicity at N = 28 Region
...Show More Authors

The effect of the tensor term in the Skyrme interaction has been estimated in calculating the static and dynamic nuclear properties in sd and fp-shell model spaces nuclei. The nuclear shell gaps have been studied with different Skyrme parameterizations; Skxta and Skxtb with tensor interaction, SkX, SkM, and SLy4 without tensor interaction, and Skxcsb with consideration of the effect of charge symmetry breaking. We have examined the stability of N = 28 for 42Si and 48Ca. The results showed that the disappearance of the magicity occurs in the shell closure of 42Si. Furthermore, excitation energy, quadrupole deformation, neutron separation energy, pairing energy, and density profile have also been calculated. Quadrupole deformation indicates a strong pairing correlation between neutrons and protons for 42Si. We found that the effect of the tensor force is most distinct when the proton shell is unoccupied. Consequently, we conclude that the interaction between neutrons depends on a correlation between n-p pairings leading to the disappearance of magic.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 24 2025
Journal Name
Journal Of The Iraqi University
La imprescindibilidad de la Exégesis en la Traducción del Texto Coránico
...Show More Authors

In the process of translating Qur’anic texts, there is an urgent need for interpretations of the Qur’anic text due to the presence of many incomprehensible Qur’anic verses or words because of our distance from the standard Arabic, language in which the Holy Qur’an was revealed, and the introduction of the foreign words into our language, in addition to the fact that many Qur’anic words are no longer used. All this prompted the need for the interpretation of the Qur'anic text, Therefore, it is necessary for the translator to resort to the books of interpretation if he intends to translate the Qur’an

View Publication Preview PDF
Publication Date
Sat Nov 01 2025
Journal Name
Journal Of Language Teaching And Research
Identity Crisis in Diana Abu-Jaber’s Origin: A Pragma-Stylistic Study
...Show More Authors

Identity crisis is a dominant literary theme, especially in most Arab women writers’ works. However, it has not been given enough attention from a linguistic point of view. By so doing, the current study intends to fill this gap by analyzing the identity crisis from a pragma-stylistic perspective by examining the writer's style in three purposely selected extracts from Diana Abu-Jaber’s novel Origin (2007). The study aims to examine the identity crisis by using pragmatic and stylistic tools and to explore the effects of Abu-Jaber’s stylistic choices on the readers of her work. To conduct this study, an eclectic model comprising Searle’s speech acts (1979), Brown and Levinson's politeness theory (1987), Leech's model of figur

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat May 31 2025
Journal Name
3rd International Scientific Conference For Human And Social Studies And Epistemological Challenges
Frankenstein Complex in Daniel H. Wilson's Robopocalypse ( ): Artificial Intelligence Conspiracies
...Show More Authors

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Wastewater Bio-solids Management for Fertilizer Quality Using Co- composting Process
...Show More Authors

Co-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a

... Show More
View Publication
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus