إحدى أهم الطرق لتقصي توزيع المجرات عبر الزمن الكوني هي دالة اللمعان LF بدلالة كتلة القرص الباريوني ψS(Mb)، القدر . لقد درسنا تقديرًا لكثافة كتلة الباريون في عينة من المجرات الحلزونية القضيبية وغير القضيبية من الادبيات السابقة، والتي تتضمن فعليًا، لكل صنف من الاجرام السماوية ذات المحتوى الباريون المرئي، جزءًا لا يتجزأ من ناتج دالة الضيائية (LF) ونسبة الكتلة إلى الضوء. استخدمت تقنية الانحدار المتعدد لحزمة البرامج الإحصائية في دراستنا ونتائجنا، مثل برنامج تحليل قواعد البيانات والرسوم البيانية)برامج Statistics Win و(Origin Pro . وفقًا للتحليل الإحصائي، هناك علاقة إيجابية قوية وارتباط وثيق للغاية (α MB~1), ، وغالبًا ما تظهر المجرات الحلزونية القرصية القضيبية وغير القضيبية قدراً مطلقاً بحدود MB < -18 mag . "الركبة" لدالة الضيائية للمجرات الحلزونية تبين قطعًا كبيرًا عند كتلة باريونية تبلغ Mb > 1010 Mʘ للمجرات الحلزونية القضيبية وغير القضيبية. يوفر هذا دليلاً يدعم الفرضية القائلة بأن اللوالب الحلزونية لنظام القرص بدأت تتشكل داخل عتبة كتلة متزايدة. نظرًا لأن زيادة دالة الكتلة الأولية للنجم مع الانزياح نحو الأحمر تكون أسرع بكثير، فقد أشارت النتائج التي توصلنا إليها إلى أن دالة الكتلة الأولية المنتقلة ψS(Mb) للمجرات القضيبية وغير القضيبيةعند انزياح أحمر مرتفع z > 0.027 للمجرات االقضيبية وz > 0.02للمجرات غير القضيبية والذي يبدو أنه يتناقص مقارنة بالكون الحرج.
Carnitine is a regulatory amino acid, necessary for the metabolism of long-chain fatty acids in the ß - oxidation, and it is important in the organization of the work of the blood brain barrier, and is very important in the treatment of infertility and sexual apathy. This study was conducted at the Poultry Farm of the Department of Animal Resource, College of Agriculture, University of Baghdad during the period from 15/2/2011 to 1/8/2011. The aim of this study was to investigate the effect of dietary supplementation with different levels of L - carnitin e on semen characteristics of guinea fowl male. A total of 24 guinea fowl male, 30 weeks of old were used in this study. Birds were randomly distributed into 4 groups (C0, C100, C200, C300)
... Show MoreIn this research, some probability characteristics functions (probability density, characteristic, correlation and spectral density) are derived depending upon the smallest variance of the exact solution of supposing stochastic non-linear Fredholm integral equation of the second kind found by Adomian decomposition method (A.D.M)
The study included studying some of the optimum environmental conditions(temperature ,light intensity ) on the production of several green algae Scendesmus quadricauda and Chlorella vulgaris in a selected culture and municipal wastewater . The study also included the recording of growth rate ,doubling time and removal of phosphate and nitrate , maximum rate was recorded to the growth with minimum in doubling time and maximum removal rate of nitrogen-nitrate and phosor- phosphate in each selected culture and municipal wastewater in each species of green algae at 25 C? and a light intensity 380 µ E / m2 / s.
The Cu2SiO3 composite has been prepared from the binary compounds (Cu2O, and SiO2) with high purity by solid state reaction. The Cu2SiO3 thin films were deposited at room temperature on glass and Si substrates with thickness 400 nm by pulsed laser deposition method. X-ray analysis showed that the powder of Cu2SiO3 has a polycrystalline structure with monoclinic phase and preferred orientation along (111) direction at 2θ around 38.670o which related to CuO phase. While as deposited and annealed Cu2SiO3 films have amorphous structure. The morphological study revealed that the grains have granular and elliptical shape, with average diameter of 163.63 nm. The electrical properties which represent Hall effect were investigated. Hall coeffici
... Show MoreIn wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThere are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreIn this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show More
ABSTRUCT
The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.
A purposive non-random
... Show More