This paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time delay and by using the models of distances.
Due to the impact of industrial companies on the ransformations and developments witnessed by the world in general nd Iraq in particular, especially in the industrial and economic Jonrnal spects, the liberalization of internal and external trade, and the idoption of the open market policy in Iraq, which led to the intensification of competition between industrial companies and heir products and services, and the increase and diversity of the Onumber of alternatives Available to the public on the one hand, and he diversity and change of their desires and needs on the other hand, which was reflected in the reality of those companies and heir products or services, especially in light of the great challenges facing companies and the deteriorat
... Show MoreThis study focuses on CFD analysis in the field of the shell and double concentric tube heat exchanger. A commercial CFD package was used to resolve the flow and temperature fields inside the shell and tubes of the heat exchanger used. Simulations by CFD are performed for the single shell and double concentric tube.
This heat exchanger included 16 tubes and 20 baffles. The shell had a length of 1.18 m and its diameter was 220 mm. Solid Works 2014, ANSYS 15.0 software was used to analyze the fields of flow and temperature inside the shell and the tubes. The RNG k-ε model was used and it provided good results. Coarse and fine meshes were investigated, showing that aspect ratio has no significant effect. 14 million
... Show MoreMixed ligand metal complexes of CrIII, FeIII,II, NiII and CuII have been synthesized using 5-chlorosalicylic acid (5-CSA) as a primary ligand and L-Valine (L-Val) as secondary ligand. The metal complexes have been characterized by elemental analysis, electrical conductance, magnetic susceptibility measurements and spectral studies. The electrical conductance studies of the complexes indicate their electrolytic nature. Magnetic susceptibility measurements revealed paramagnetic nature of the all complexes. Bonding of the metal ion through –OHand –COOgroups of bidentate to the 5-chlorosalicylic acid and through –NH2 and –COOgroups of bidentate to the L-valine by FT-IR studies . The agar diffusion method has been used to study the antib
... Show MoreMetal (III) and (II) coordination compounds of o- phenylenediamine, oxalic acid dihydrate and 8-hydroxyquinoline were synthesized for mixed ligand complexes and characterized using FT-IR, UV-Vis and mass spectra, atomic absorption, elemental analysis, electric conductance and magnetic susceptibility measurements. In addition, thermal behavior (TGA) of the metal complexes (1-6) showed good agreement with the formula suggested from the analytical data. The stoichiometric reaction between the metal (III) and (II) ions with three various ligands in molar ratio at aqueous ethyl alchol for (1:1:1:1) (M: O-PDA: OA: 8-HQ) [where M = Cr+3, Mn+2, Co+2, Ni+2. Cu+2 and Zn+2; O-PDA = O-Phenylenediamine; OA = Oxalic acid and 8-HQ = 8-Hydroxyquinoline]. R
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreLet R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.
In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
The focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.