A developed model has been put for the hypothesis of capturing moons in explaining the origin of Jupiter moons, and study the change of the orbital properties of these satellites as well as the distance from the planet. Jupiter moons were divided into two types according to their physical and orbital properties, they are the moons , which are formed from the same material as the planet, so it was named the original moons ,while the moons that have been captured from the surrounding space was renamed exotic moons . And the moons of exotic origin asteroid belt and the Kuiper belt in the region which is behind Neptune, the origin of each clique of moons is an asteroid fragmented after colliding previously with another body and then gathered again by simple gravity of its parts among them, and then it has been disintegrated once again due to the influence of the gravity of the planet against it, and the process of captivity are due to the gravitational interaction between the asteroid or comet and the planet when one of them enters within Hill ball to Jupiter.
This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreA three species food web model involving a stage structure and cannibalism in the top predator species is proposed and studied. It is assumed that the prey species growth logistically in the absence of predator and the predation process occurred according to theLotka-Volterra functional response. The existence, uniqueness and bounded-ness of the solution of the model are investigated. The local and global stability conditions of all possible equilibrium points are established.The persistence conditions of the model are also determined. The local bifurcation near each of the equilibrium points is analyzed. The global dynamics of the model is investigated numerically and compared with the obtained analytical results. It is observed that the p
... Show MoreThe study aims budget in grades use of smart phones to individuals (sample) according variable sex (males and females) and used researcher descriptive analytical method consisted sample of (300) students have chosen the way stratified random, and the study variables (academic achievement of students, sex and the use of Smart phones) resolution was adopted as a tool for data collection. The most important results of the study that females are more commonly used for smart phones, as well as the existence of a positive relationship between the inverse statistically significant use of smart phones and the rate of school for students and the use of smart phones h
... Show MoreIn this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive meas
... Show MoreFind taught dimension aesthetic in the formation of post-modernism, which is one of the themes of aesthetics in the stream of postmodernism, is problematic because of the lack of provisions and fixed values reinforce the concept of beauty, and put done technical plastic in the circle of evaluation and judgment aesthetic, this research as an attempt to reveal the aesthetic concepts that can be drawn from artistic experiments in the formation of post-modernism, through the development of those concepts viable mainstream.
Search contains four chapters: the first chapter includes a general approach to the research, has been showcasing the research problem and the importance of research and goal of Search: detection dimension aesthetic in
Public-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThis research was carried out in quail in the laboratory of histopathology diseases during four months. The objectives of this study was to detecting the effects of the addition of the alcohol extract of ginger to ovary tissue of quail. The two groups of birds were in almost similar weights and were placed in cages. Each group consisted of 8 quails. The first group (control group) fed on regular feeding without adding alcoholic extract of ginger. The second group (treated group) fed on the same normal food after adding the alcohol extract of ginger at a concentration of 300 mg / kg. The results indicated that ginger have positive effects on folliculogenesis.