Preferred Language
Articles
/
SBY8nYoBVTCNdQwCJKHH
The infrared <i>K</i>-band identification of the DSO/G2 source from VLT and Keck data
...Show More Authors
Abstract<p>A fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT <italic>K<sub>s</sub></italic>-band and Keck <italic>K</italic>′-band data result in clear continuum identifications and proper motions of this ∼19<sup><italic>m</italic></sup> Dusty S-cluster Object (DSO). In 2002-2007 it is confused with the star S63, but free of confusion again since 2007. Its near-infrared (NIR) colors and a comparison to other sources in the field speak in favor of the DSO being an IR excess star with photospheric continuum emission at 2 microns than a core-less gas and dust cloud. We also find very compact <italic>L</italic>′-band emission (<0.1″) contrasted by the reported extended (0.03″ up to ∼0.2″ for the tail) Brγ emission. The presence of a star will change the expected accretion phenomena, since a stellar Roche lobe may retain a fraction of the material during and after the peri-bothron passage.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
مجلة كلية العلوم الاسلامية
The most prominent challenges facing Muslim youth and addressing them from a Quranic perspective
...Show More Authors

The research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.

View Publication Preview PDF
Publication Date
Sat Mar 25 2023
Journal Name
Kirkuk University Journal For Agricultural Sciences
The role of the agricultural extension in educating farmers about the legislation on protecting the environment from pollution with chemical pesticides
...Show More Authors

The research aimed to determine the role of the agricultural extension in educating farmers about the legislation on the protection of the rural environment from pollution with chemical pesticides working in the Department of Agricultural Extension and Training and the Department of Agricultural Extension in the directorates of agriculture of Najaf and Qadisiyah, and to determine the role of the agricultural extension in the axis of farmers' use of the correct methods to protect the rural environment from pollution with chemical pesticides and the axis of the reasons that lead farmers to pollute the rural environment with chemical pesticides, and to achieve the objectives of this research prepared A questionnaire in the light of rev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 18 2022
Journal Name
Journal Of The College Of Basic Education
A (k,ℓ) Span in Three Dimensional Projective Space PG(3,p) Over Galois Field where p=4
...Show More Authors

الغرض من هذا العمل هو دراسة الفضاء الإسقاطي ثلاثي الأبعاد PG (3، P) حيث p = 4 باستخدام المعادلات الجبرية وجدنا النقاط والخطوط والمستويات وفي هذا الفضاء نبني (k، ℓ) -span وهي مجموعة من خطوط k لا يتقاطع اثنان منها. نثبت أن الحد الأقصى للكمال (k، ℓ) -span في PG (3،4) هو (17، ℓ) -span ، وهو ما يساوي جميع نقاط المساحة التي تسمى السبريد.

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Studying the Adsorption of Lead from aqueous Solution using Local Adsorbent Material Produced from Waste Tires by Pyrolysis
...Show More Authors

In this research a local adsorbent was prepared from waste tires using two-step pyrolysis method. In the carbonization process, nitrogen gas flow rate was 0.2L/min at carbonization temperature of 500ºC for 1h. The char products were then preceded to the activation process at 850°C under carbon dioxide (CO2) activation flow rate of 0.6L/min for 3h. The activation method produced local adsorbent material with a surface area and total pore volume as high as 118.59m2 /g and 0.1467cm3/g, respectively. The produced . local adsorbent (activated carbon) was used for adsorption of lead from aqueous solution. The continuous fixed bed column experiments were conducted. The adsorption capacity performance of prepared activated carbons in this work

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 PARTIAL PURIFICATION OF BACTERIOCIN PRODUCED FROM PEDIOCOCCUS ACIDILACTICI-FMAC278 AND WEISSELLA PARAMESENTEROIDES-DFR6 AND ITS APPLICATION IN THE PRESERVATION OF CHICKEN SAUSAGES: PARTIAL PURIFICATION OF BACTERIOCIN PRODUCED FROM PEDIOCOCCUS ACIDILACTICI-FMAC278 AND WEISSELLA PARAMESENTEROIDES-DFR6 AND ITS APPLICATION IN THE PRESERVATION OF CHICKEN SAUSAGES
...Show More Authors

Bacteriocins were partially purified by ammonium sulphate 50% concentraction, bacteriocin activity of Pediococcus acidilactici-FMAC278 was 25600 U/ml with 5.8 folds and 7.6% yeild, the activity decrease to 12800 U/ml after dialysis with 6.3 folds and 3% yield, On the other hand the bacteriocin activity of Weissella paramesenteroides-DFR6 was 12800 U/ml with 2.7 folds and 8.8% yeild, after dialysis the activity became 6400 U/ml with 5.1 fold and 3.4% yield, Chicken Sausage were made by adding 0.25, 0.5 and 1% particaly purified bacteriocin to study its effect on microorganisms and increasing shelf life of Sausage. It is found that bacterial numbers were decreased after 3 days of storage at refrigerator at 0.5% conc. While the molds decrea

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of banking effort tests in the face of monetary credit risk and its impact on the profits and adequacy of the bank’s capital : / a case study of Sumer Commercial Bank for the period from 2015 to 2020
...Show More Authors

The research seeks to identify the proposed scenarios to predict and ward off monetary credit risks that the bank is exposed to in the future, using the banking stress tests model, and showing their impact on capital adequacy and profitability ratio,To achieve this purpose, Sumer Commercial Bank was taken as a case study, and mathematical equations were used to extract the results. Low percentage of profits and returns, strictness in the process of granting credit and financing operations in order to reduce credit risks.

View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Characterization Performance of Monocrystalline Silicon Photovoltaic Module Using Experimentally Measured Data
...Show More Authors

Solar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Aesthetics Contents of Data Visualization as an Input to its humanization
...Show More Authors

The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF