The major goal of this research was to use the Euler method to determine the best starting value for eccentricity. Various heights were chosen for satellites that were affected by atmospheric drag. It was explained how to turn the position and velocity components into orbital elements. Also, Euler integration method was explained. The results indicated that the drag is deviated the satellite trajectory from a keplerian orbit. As a result, the Keplerian orbital elements alter throughout time. Additionally, the current analysis showed that Euler method could only be used for low Earth orbits between (100 and 500) km and very small eccentricity (e = 0.001).
A low speed open circuit wind tunnel has been designed, manufactured and constructed at the Mechanical Engineering Department at Baghdad University - College of Engineering. The work is one of the pioneer projects adapted by the R & D Office at the Iraqi MOHESR. The present paper describes the first part of the work; that is the design calculations, simulation and construction. It will be followed by a second part that describes testing and calibration of the tunnel. The proposed wind tunnel has a test section with cross sectional area of (0.7 x 0.7 m2) and length of (1.5 m). The maximum speed is about (70 m/s) with empty test section. The contraction ratio is (8.16). Three screens are used to minimize flow disturbances in the test section.
... Show MoreBackground: low back pain is one of the most common public health problems and of the most common musculoskeletal complaint. Many risk factors have been considered for developing low back pain include smoking, obesity and sedentary lifestyle.
Aim of study: To evaluate smoking, obesity, and sedentary lifestyle associations with low back pain in young adults aged (18 – 39 years).
Methods: a comparative cross sectional study for young adults aged 18 – 39 years, participants with low back pain as a symptom constitutes the first group, others free of this symptom considered as the control group. Age and gender matched in both groups. Smoking, obesity and sedentary life sty
... Show MoreObjective: The present study investigates whether the exposure to low-power diode laser induces denaturation in red blood cell (RBC) membrane protein composition, and determines the irradiation time for when denaturation of membrane protein process begins. Background: A low-energy laser has been used extensively in medical applications. Several studies indicated significant positive effects of laser therapy on biological systems. In contrast, other studies reported that laser induced unwanted changes in cell structure and biological systems. The present work studied the effect of irradiation time of low-power diode laser on the structure of membrane proteins of human RBCs. Materials and methods: The RBC suspension was divided into five equa
... Show MoreBackground/objectives: To study the motion equation under all perturbations effect for Low Earth Orbit (LEO) satellite. Predicting a satellite’s orbit is an important part of mission exploration. Methodology: Using 4th order Runge–Kutta’s method this equation was integrated numerically. In this study, the accurate perturbed value of orbital elements was calculated by using sub-steps number m during one revolution, also different step numbers nnn during 400 revolutions. The predication algorithm was applied and orbital elements changing were analyzed. The satellite in LEO influences by drag more than other perturbations regardless nnn through semi-major axis and eccentricity reducing. Findings and novelty/improvement: The results demo
... Show MoreThis article co;nsiders a shrunken estimator ·Of Al-Hermyari· and
AI Gobuii (.1) to estimate the mean (8) of a normal clistributicm N (8 cr4) with known variance (cr+), when <:I guess value (So) av11il ble about the mean (B) as· an initial estrmate. This estimator is shown to be
more efficient tl1an the class-ical estimators especially when 8 is close to 8•. General expressions .for bias and MSE -of considered estitnator are gi 'en, witeh some examples. Nut.nerical cresdlts, comparisons and
conclusions ate reported.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, we study some cases of a common fixed point theorem for classes of firmly nonexpansive and generalized nonexpansive maps. In addition, we establish that the Picard-Mann iteration is faster than Noor iteration and we used Noor iteration to find the solution of delay differential equation.