This paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela
... Show MoreInnovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high inj
... Show MoreAbstract
The aim of the present research is to identify the test wisdom and the preoccupation with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and employee or non-employee, and revealing the relationship between the test wisdom and the preoccupation with learning and psychological tension. The research sample consisted of (75) students randomly selected from postgraduate students at the college of Education. The researcher applies test –wisdom of (Mellman & Ebel) and measurement of preoccupation with learning prepared by (Al-zaabi 2013) also, the researcher used the scale of t
... Show MoreThis study was undertaken to prepare Nano zinc oxide (ZnO) by precipitation and microemulsion methods. Scanning electron microscopy (SEM), X-ray diffraction (XRD), FTIR spectrometry, atomic force microscopy (AFM), and Brunauer Emmett Teller (BET) surface area were the techniques employed for the preparation. The particle size of prepared nano ZnO was 69.15nm and 88.49nm for precipitation and microemulsion methods, respectively, which corresponded to the BET surface area 20.028 and 16.369m2/g respectively. The activity of prepared nano ZnO as a photocatalyst was estimated by the removal of ampicillin (Amp) under visible light. This study, therefore, examined the effect of pH in the range of 5-11, initial concen
... Show MoreThe purpose of this research is to determine the extent to which independent auditors can audit the requirements of e-commerce related to (infrastructure requirements, legislation and regulations, tax laws, and finally human cadres). To achieve this, a questionnaire was designed for auditors. Numerous statistical methods, namely arithmetic mean and standard deviation, have been used through the implementation of the Statistical Packages for Social Sciences (SPSS) program.
The research has reached several results, the most important of which are: There are noobstacles to enabling the auditor to audit the application of the e-commerce requirements as well as the respective(infrastructure requirements, legislation and regulations, t
... Show MoreIn current research Copper was employed for preparing a ternary system of Al–Si alloy in different (0.2–2.5 wt. %) the best was taken is (1.5%wt) of copper that circumstances of solidification for improving the mechanical performance of the available in aluminium alloy. Cast iron molds were prepared to obtain tensile strength testing specimens. Alloys were prepared by employing gas furnaces. The molten metal was poured into a preheated cast-iron mold. The obtained alloy structures were studied using an X-ray diffractometer and optical microscopy. The mechanical performance of the prepared alloys was examined under the influence of different hardening conditions in both heat and non-heat-treated conditions. The outcomes showed at the
... Show MoreBCl3 is toxic gas and its detection is of great importance. Thus, here, B3LYP, M06-2X, and B97D density functionals are utilized for probing the effect of decorating Zn, Cd, and Au on the sensing performance of an AlP nano-sheet (AlPNS) in detecting the BCl3. We predict that the interaction of pure AlPNS with BCl3 is physisorption, and the sensing response (SR) of AlPNS is approximately 9.2. The adsorption energy of BCl3 changes from −4.1 to −18.8, −19.1, and −19.5 kcal/mol by decorating the Zn, Cd, and Au metals into the AlPNS surface, respectively. Also, the corresponding SR meaningfully rises to 40.4, 59.0, and 80.9, indicating that by increasing the atomic number of metals, the sensitivity of metal decorated AlPNS (metal@AlPNS)
... Show MoreAccording to the European Union Water Framework Directive requirements, diatom metrics were used to assess the ecological status of surface waters in the Gaziantep central catchment (Turkey). A total of 42 diatom taxa were identified. A few environmental factors (especially lead, copper, orthophosphate, and chromium) played significant roles on the distribution of diatom assemblages among the sampling stations. The first two axes of the canonical correspondence analysis elucidated 91.6 % of the species–environment correlations with 13.9 % of the cumulative variance of species. The applied diatom indices (TIT – Trophic Index Turkey, TI – Trophic Index, and EPI-D – Eutrophication and/or Pollution Index-Diatom) showed different results
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determinatio
... Show More