In this paper, a study was made to determine the properties of Jovian radio bursts emitted at frequency 20.1MHZ. The data were provided from the Radio Jove archive for twelve years (2000-2012) for multi stations. The duration time for Long bursts (L) was (10-30) seconds and for Short bursts (S) was (10-20) seconds. The effect of radio bursts from the Sun and the galactic background were calculated at the same frequency and were found that radio bursts from the Sun will reduce the occurrence probability of Jovian radio bursts much more than radio bursts from the galactic background. The distribution of Jovian radio bursts was different; the occurrence probability with respect to the northern latitudes was more than the southern latitudes.
An electrochemical sensor based on manganese dioxide nanorodMnO2and Graphene oxide (GO) functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (FGO)/MnO2Nanocompositewas developed for voltammetric determination of Tetracycline (TET).The working electrode WE of SPCE was modified bya drop casting method. X-ray powder diffractometer (XRD), scanning electron microscopy (SEM) and FT-IR were employed to characterize the synthesized FGO/MnO2. The determination of TET at the modified electrode was studied by cyclic voltammetry (CV) and differential pulse voltammetry (DPV) in the phosphate buffer solution (PBS).TET show sharp increase in the oxidation peaks in the pH 2.Voltammetric characteristics of TET (Epa, Ipa) were estimate
... Show MoreMatching between wind site characteristics and wind turbine characteristics for three selected sites in Iraq was carried out. Site-turbine matching for potential wind power application in Iraq has not yet been well reported on. Thus, in this study, five years’ wind speed data for sites located in Baghdad (33.34N, 44.40E), Nasiriyah (31.05N, 46.25E), and Basrah (30.50N, 47.78E) were collected. A full wind energy analysis based on the measured data, Weibull distribution function, and wind turbine characteristics was made. A code developed using MATLAB software was used to analyse the wind energy and wind turbines models. The primary objective was to achieve a standard wind turbine-site matching based on the capacity factor. Another matching
... Show MoreDivine laws are policies that Allah runs his servants, people are different in the accord-ing to the difference of periods .Each period has its kind of conduct and furtune of kindness and their own interest . As every nation has a kind of conduct to be applicable to them even if it will be decay in the rights of the others . For this meaning it would be permitted to meet two prophets in the same period according to the difference of their interest.
The prophecy of Mohamad has been demonstrated and his message was famous according to his miracles and decisive signs. And people from other religions tried to deny his message . As the Christians tried to deny his message by making nobody believe his signs and miracles .
And as the Jews
It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.