In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel function's solution appeared to be close to the exact solution for eccentricity of 1 and more than 10 number of terms. Finally, the representation of the first kind Bessel function J1(x) was closer to the exact representation only for eccentricity 0.5 and (N=1-10).
Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThe study aims to investigate the effect of the Six Thinking Hats Strategy on the achievement of essay writing skills among third-year students in Arabic Language and Literature who are Persian speakers enrolled in the course of Essay Writing (III) at Shiraz University for the academic year 2019-2020. The sample of the study consisted of (15) male and female students who were taught according to the pre-posttest, using the quasi-experimental approach. After applying the statistical analysis on the scores of the post-test, the results showed that there are statistically significant differences in the average of students' achievement in the skills of essay writing in terms of using the Six Thinking Hats Strategy. The results also proved th
... Show MoreThe compound Fe0.5CoxMg0.95-xO where (x= 0.025, 0.05, 0.075, 0.1) was prepared via the sol-gel technique. The crystalline nature of magnesium oxide was studied by X-ray powder diffraction (XRD) analysis, and the size of the sample crystals, ranging between (16.91-19.62nm), increased, while the lattice constant within the band (0.5337-0.4738 nm) decreased with increasing the cobalt concentration. The morphology of the specimens was studied by scanning electron microscopy (SEM) which shows images forming spherical granules in addition to the presence of interconnected chips. The presence of the elements involved in the super
This paper is a review of the genus Sitta in Iraq, Five species of this genus are recognized
Sitta kurdistanica, S. neumayr, S. europaea, S.dresseri and S. tephronota. Geographical
distribution and systematic nots were given for separation and identification, also some notes
on nest building and nest sites of S. tephronota supporting by figures are presented.
Flavonoids were extracted from Zizyphus spina-christi leaves by Ethyl acetate after acid digested and used as antioxidant. The dried extract was added separately to each sample of fat extracted from hallow cow and sheep bones as follows: T1 cow fat, T2 control for cow fat, T3 sheep fat and T4 control for sheep fat (the control T2 and T4 reffered to samples without added antioxidant).
Samples were stored at -18, 5, 25 and 55 °C for 28 days. The storage trials were conducted at -18, 5 and 25 °C for 28 days for T1, T2, T3 and T4. The chemical indices examined initially and at the end of storage period. PVs was 1.46, 1.46, 1.8 and 1.8 meq/ Kg oil respectively, FFA values were 0.245, 0.245, 0.244 and 0.244% respectively and TBA va
Background: Deep vein thrombosis is a multi causal disease and its one of most common venous disorder, but only one quarter of the patients who have signs and symptoms of a clot in the vein actually have thrombosis and need treatment .The disease can be difficult to diagnose. Venous ultrasound in combination with clinical finding is accurate for venous thromboembolism, its costly because a large number of patients with suspicious signs and symptoms. Venography still the gold standard for venous thromboembolism but it is invasive. The D-dimer increasingly is being seen as valuable tool rolling out venous thromboembolism and sparing low risk patients for further workup.Objectives: this study has designed the role of D-dimer to confirm diag
... Show More