Most of the known cases of strong gravitational lensing involve multiple imaging of an active galactic nucleus. The properties of lensed active galactic nuclei make them promising systems for astrophysical applications of gravitational lensing. So we present a simple model for strong lensing in the gravitational lensed systems to calculate the age of four lensed galaxies, in the present work we take the freedman models with (k curvature index =0) Euclidian case, and the result show a good agreement with the other models.
Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreThe goal of this paper is to show the kinematic characteristics of gaseous stellar dynamics using scaling coefficient relationships (such as Tully-Fisher) in different spiral galaxies. We selected a sample of types of spiral morphology (116 early, 150 intermediate, and 146 late) from previous literature work, and used statistical software (statistic-win-program) to find out the associations of multiple factors under investigation, such as the main kinematic properties of the gaseous-stellar (mass, luminosity, rotational speed, and baryons) in different types of spiral galaxies. We concluded that there is a robust positive connection between Log Vrot.max.) and Log Mstar(B-V), as well as between Log Vrot.max. and Log Mbar (
... Show MoreMany cases of gravitational bullets are reported in developed and non-developed countries. However, few papers highlighted these cases in the literature. In our study, we present two cases of gravitational bullets that have an unusual coincidence in the injury characteristics through their ages, and gender, the site of the inlet.
We study clusters in warm dark matter (WDM) models of a thermally produced dark matter particle 0.5 keV in mass. We show that, despite clusters in WDM cosmologies having similar density profiles as their cold dark matter (CDM) counterparts, the internal properties, such as the amount of substructure, show marked differences. This result is surprising as clusters are at mass scales that are a thousand times greater than that at which structure formation is suppressed. WDM clusters gain significantly more mass via smooth accretion and contain fewer substructures than their CDM brethren. The higher smooth mass accretion results in subhaloes which are physically more extended and less dense. These fine-scale differences can be probed by strong
... Show MoreThe problem of dark matter in galaxies is still one of the most important unsolved problems in the contemporary extragalactic astronomy and cosmology. The existence of a significant dynamic difference between the visible mass and the conventional mass of galaxies firmly establishes observational result. In this paper an unconventional explanation will be tested as an alternative to the cold dark matter hypothesis; which is called the modified Newtonian dynamics (MOND).
In this paper covers the simulation of galactic evolutions; where the two hypotheses are tested via the rotation curves. N-body simulation was carried adopting different configuration lik
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThis study aims to investigate the features of stellar-gaseous kinematics and dynamics mass using scaling coefficient relationships (such as the Faber–Jackson relation (FJR)) of two samples of elliptical and lenticular galaxies. These two samples of 80 ellipticals and 97 lenticulars were selected from previous literature works. The Statistical Package for Social Sciences )SPSS( and Matrix Laboratory (MATLAB) program were used to find out the associations of multiple factors under investigation such as main kinematic properties of the gaseous-stellar (effective radius Re, surface density within the effective radius (Ʃeff) , stellar mass in the blue band (Mstar (B)), gas mass ( Mgas), dynamic (Mdyn) and baryonic (Mbar), supermassiv
... Show More