Statistical studies are reported in this article for an active galactic nuclei sample of different type of active galaxies Seyferts 1, Seyferts 2, and Quasars. These sources have been selected from a Catalogue for bright X-ray galaxies. The name of this index is ROSAT Bright Source Catalogue (RBSC) and the NRAO VLA Sky Survey (NVSS). In this research, multi-wavelength observational bands Radio at 1.4 GHz, Optical at 4400 A0, and X-ray at energy 0.1-2.4 KeV have been adopted in this study. The behavior of flux density ratios has been studied , with respect to the absolute magnitude . Furthermore, the Seyfert1 and Seyfert 2 objects are combined in one group and the QSOs are collectest in another group. Also, it has been found that the ratios , are increasing towards fainter optical absolute magnitude especially in Quasars.
Investment in Human is one of the best and most important investments as it is renewed and developed resource over time in comparison with depleted material resources. Human resources is considered the part of the population that could be employed economically to contribute in increasing production energies as it is the support pillar of the society and have great energies that construct the society and raise of nations as well as he is distinguished with characteristics of ambitions to freedom.
Iraq is one of the countries that has large number of population in age of work and production and reduce in age dependent classes (children and old people).This dynamic in population led to step
... Show MoreThe present study examines critically the discursive representation of Arab immigrants in selected American news channels. To achieve the aim of this study, twenty news subtitles have been exacted from ABC and NBC channels. The selected news subtitles have been analyzed within van Dijk’s (2000) critical discourse analysis framework. Ten discourse categories have been examined to uncover the image of Arab immigrants in the American news channels. The image of Arab immigrants has been examined in terms of five ideological assumptions including "us vs. them", "ingroup vs. outgroup", "victims vs. agents", "positive self-presentation vs. negative other-presentation", and "threat vs. non-threat". Analysis of data reveals that Arab immig
... Show MoreThe transportation model is a well-recognized and applied algorithm in the distribution of products of logistics operations in enterprises. Multiple forms of solution are algorithmic and technological, which are applied to determine the optimal allocation of one type of product. In this research, the general formulation of the transport model by means of linear programming, where the optimal solution is integrated for different types of related products, and through a digital, dynamic, easy illustration Develops understanding of the Computer in Excel QM program. When choosing, the implementation of the form in the organization is provided.
This study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand
Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results
... Show MoreBackground: Breast cancer is the most common
malignancy affecting females worldwide. The association
of Epstein-Barr virus (EBV) with this cancer is a longstanding
interest to this field.
Aim: to investigate the presence of EBV in breast tumor
tissue in relation to age.
Patients and Methods: Paraffin-embedded tissue blocks
from 45 female patients with breast tumors (ranged in age
from 28 to 85 years) were retrieved. The cases were
grouped into two categories: group (A): included 30 cases
with breast carcinoma and group (B): included 15 cases
with benign breast diseases as a control group .The
expression of EBV protein was examined
immunohistochemically.
Results: Twelve (40%) of the 30 breast canc
The use of bio-fruit waste has more attention in recent years because of the low cost of bio-fibers and the protection of the environment. In this study, the epoxy was reinforced with fruit residues (cantaloupe peel powder) in proportions (1%, 2%, 3%, 4%, 5%, 7.5%, and 10% by weight) as results of mechanical tests such as impact, hardness, flexural and compression.
Adding sub microns particle size cantaloupe peels particles with a weight ratio of 7.5% improves the epoxy mechanical properties, like impact strength, hardness, flexural strength, and compression strength by 59.43%, 5.8%, 45.7%, and 118.2%, respectively.
Using X-ray diffraction, the crystallite size ( D) of cantaloupe peel the powder was about (3 nm).
In
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More