Schmidt Cassegrain spider obscuration telescope (SCT) is one of the types of observations operating with a concave mirror. It combines several lenses and mirrors working together as an optical system. The light rays fall into the tube from the main mirror and gather on another smaller mirror called a secondary mirror. Unlike the formation of Newton's telescope, no light is made from the secondary mirror out the side of the tube but is directed to the middle of the main mirror. There is an opening in the middle of the main mirror so the light beam can go out and direct the vision lens system. The secondary mirror is located in the middle of a glass slice and is installed by thin carriers. The function of this board is to correct the portr
... Show MoreThis research deals with the aesthetics of describing nature and the joys of urban life in the environment of Fatimid Egypt, among a group of poets, who were deceived by its enchanting beauty and breathtaking scenery, through it they depicted the reality of the life they live, and the things that involved them, as well as showing their personal culture, and the joys of life that experience, articulating this with a descriptive and analytical study, focusing on how the poet portrayed the visual scene, in an important stage of Arabic literature in Egypt.
The genus Latrodectus Walckenaer, 1805 (Araneae: Theridiidae) is a worldwide distribute genus (Graudins et al., 2001), it includes a group of species commonly referred to as widow spiders. It's considered a taxonomically complex genus as the status of several forms had not been properly evaluated and specific boundaries are not well defined or understood (Levi, 1959; 1967; Garb et al., 2001), therefore, in multiple cases, populations has been uncritically referred to as different taxa. Discriminating between Latrodectus species using morphology has always been problematic (Levi, 1983), it is difficult taxonomically and readily separated from members of other Theridiid genera (Mirshamsi, 2005). The Genus Asagena Sundevall, 1833 was revalidat
... Show MoreThe species of Opilio kakunini Snegovaya, Cokendolpher & Mozaffarian, 2018 was recorded for the first time in Iraq; as well as to four species belonging to this order which were recorded previously. In this paper, we added a new species to the checklist of Iraqi opilionid fauna with a description of the most important characteristics, along with genitalia, for both males and females are presented with digital photographs. Specimens of males and females were collected from Al- Rifai district northern of Dhi-Qar Province, southern of Iraq.
In this paper, a harvested prey-predator model involving infectious disease in prey is considered. The existence, uniqueness and boundedness of the solution are discussed. The stability analysis of all possible equilibrium points are carried out. The persistence conditions of the system are established. The behavior of the system is simulated and bifurcation diagrams are obtained for different parameters. The results show that the existence of disease and harvesting can give rise to multiple attractors, including chaos, with variations in critical parameters.
Some microorganisms can produce nanocellulose, which is known as bacterial nanocellulose (BNC); the most active bacterial producer is acetic acid bacteria (AAB), which is a gram-negative, motile and obligate aerobic belongs to the family Acetobacteraceae. Bacterial nanocellulose has excellent attention in medical (surgical domain), industrial and pharmaceutical fields because of its flexible properties, characteristics and advantages. So, in this study, the AAB (5AC) isolate was isolated from apple vinegar. The production of BNC was performed by using a natural medium called palm dates liquid medium, the produced bacterial Cellulose was purified by using the sodium hydroxide method; it was observed that the wet weight of the BNC was a
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More