In this paper, the rotation curve of the Milky Way galaxy has been determined using the observed HI emission line at a wavelength of 21 cm. Particularly, the Tangent Point Method was used in order to measure the rotational velocity and the distance to the center of the Milky Way. The measured rotation curve showed that the rotational velocity remains approximately constant at large distances from the center of the Galaxy. This is actually an evidence for the existence of dark matter in the halo of the Milky Way. If all the matter in the Milky Way is visible, then the behavior of the rotation curve of the galaxy should experience a Keplerian decline. The mass of the Milky Way within a radius of 15 kpc was also estimated to be ~ 1.65 × 10
... Show MoreIn this paper, we built a mathematical model for convection and thermal radiation heat transfer of fluid flowing through a vertical channel with porous medium under effects of horizontal magnetic field (MF) at the channel. This model represents a 2-dimensional system of non-linear partial differential equations. Then, we solved this system numerically by finite difference methods using Alternating Direction Implicit (ADI) Scheme in two phases (steady state and unsteady state). Moreover, we found the distribution and behaviour of the heat temperature inside the channel and studied the effects of Brinkman number, Reynolds number, and Boltzmann number on the heat temperature behaviour. We solved the system by buildi
... Show MoreIn this article four samples of HgBa2Ca2Cu2.4Ag0.6O8+δ were prepared and irradiated with different doses of gamma radiation 6, 8 and 10 Mrad. The effects of gamma irradiation on structure of HgBa2Ca2Cu2.4Ag0.6O8+δ samples were characterized using X-ray diffraction. It was concluded that there effect on structure by gamma irradiation. Scherrer, crystallization, and Williamson equations were applied based on the X-ray diffraction diagram and for all gamma doses, to calculate crystal size, strain, and degree of crystallinity. I
... Show MoreOne of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of amobile slaughterhouse to reduce this phenomen
... Show MoreEmail is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B
... Show MoreA field experiment was carried out during the spring season 2019 and 2020 to obtain a fast, uniform, and high field emergence ratio of maize seeds under a wide range of environmental conditions. Randomize complete block design in the split-plot arrangement was used with three replications. The first factor in the main plots was cultivars (5018, Baghdad3 and Sumer). The second factor in the sub-plots was seeds soaking with ascorbic and citric acids (100 mg L−1) each and humic (1 ml L−1) in addition to control treatment (seeds soaking with distilled water only). Results showed the superiority of soaking with humic acid significantly, as means of characteristics of field emergence in both seasons, respectively, were as follows: Last day of
... Show MoreThe dispersion relation of linear quantum ion acoustic waves is derivate according to a fluid approach that depends on the kinetic description of the systems of charged particles model. We discussed the dispersion relation by changing its parameters and graphically represented. We found through graphs that there is full agreement with previous studies on the subject of interest. That motivates us to discuss the dispersion relation of waves depending on the original basic parameters that implicitly involved in the relationship which change the relationship by one way or another, such as electron Fermi temperature and the density at equilibrium state.
Quantum dots (QDs) of cadmium sulfide (CdS) was prepared by chemical
reaction method with different potential of hydrogen (pH) values. The
morphological and optical measurements of cadmium sulfide QDs were considered
by atomic force microscopy (AFM), ultraviolet-visible (UV-VIS.) and
photoluminescence (PL) spectrometer respectively. The energy gap (Eg) was
calculated from photoluminescence spectra were found to be about 2.7, 2.6 and 2.5
eV at pH values 8, 10 and 12 respectively for CdS QDs. The decreasing of energy
gaps is rises from the effect the pH solution increases, which in turn leads to the
shifted of the PL spectrum toward red shifted, which creates the energy bands at
surface states are shallow bands.
A study of the singlet and triplet states of two electron systems in the first excited state was performed using a simple quantum mechanical model, which assigns the 1s,and 2s orbital with two different variational parameters. Our results agree with a high level calculation used by Snow and Bills.
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis
... Show More