A fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
The gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km.
... Show MoreMeasuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The cuneiform texts considered one of the most important resources which play an important role , wich help us to know how was the economic , politic and religious conditions , and everything related of the history of Mesopotamia , which contain many of information that enrich our knowldgement about Mesopotamia civilization , since using writing as away to documentation the science and human knowldgement . In this research we studied four cuneiform texts, which confiscated and keeped in the Iraq museum , all of these are economic texts , the content of three of them are loans, are take the numbers (IM.206972- IM.163718-IM.163808-), the fourth text is the text of income which take the number (IM.163182). therefore , We will talk about what l
... Show MoreThe research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.
Abstract:
Viral marketing has become one of the modern strategies adopted by organizations in the marketing of products and services. The idea of viral marketing focuses on the social relations between individuals and groups. As a result of the technological development, most organizations have resorted to using the Internet and its applications and social media to market and promote their products. To reach the largest number of consumers to display their products and services in many ways, including text, audio, visual or video and thus affect the behavior of the consumer.
The problem of the study was the following question (do viral marketing technologies have an impact on consumer behavior?)
... Show MoreThe research aims to identify intelligence spiritual among a sample of students Baghdad University as well as to identify the differences between students in intelligence spiritual according to variable type (male - female), and variable area of study (Science - a human) and variable (First grade - fourth grade), The research sample consisted of (300) students, were applied scale search - a spiritual Intelligence Scale (prepared by the researcher), has resulted in the search results for: -
The students of the University of Baghdad (sample) enjoyed a high level of spiritual intelligence.
- There are no differences between males and females in the spiritual intelligence.
- There
Isobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo
... Show MoreComplexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4-thiadiazole-2-yl)phenyl) thiourea have been prepared and characteizedby elemental analysis, Ff-[R, and u.v./ visible spectra moreover,determination of metal content M%o by flame atomic absorptionspectroscopy, molar conductance in DMSO solution and magneticmoments (peffl.The result showed that the ligand (L) was coordinated to Mn+2, Ni+2,Ct+2,2n+2,Cd+2, and Hg+2 ions through the nitrogen atoms and sulpheratoms.From the result obtained, rhe following general formula [MLCl2] hasbeen given for the prepared complexes with an octahedral geometryaround the metal ions for all complexes.where M= Mn+2, Ni+2, cu+2, zn+2, cd+2, and Hg+2 l= l-phenyl-3-(2-(5-(phenyl amino
... Show More