According to Chandra Survey Observatory Near-Asteroid Belt Comets, the solar wind's contact with the comet produces a variety of spectral characteristics. The study of X-ray spectra produced by charge exchange is presented here. The spectrum of a comet can reveal a lot about its composition. This study has concentrated on the elemental abundance in six different comets, including 17P/Holmes, C/1999T1, C/2013A1, 9p/Temple1, and 103p/Hartley2 (NEAT). Numerous aspects of the comet's dynamics allow it to behave in a unique manner as it gets closer to the Near-Asteroid Belt. These characteristics are being examined, and some studies are still ongoing. The computations allow us to observe, for instance, how the composition of a comet's upper atmosphere affects how much gas it produces. For several comet morphologies, both linear and nonlinear, bow shock, contact surface, and stagnation point are investigated in relation to gas production rate. Our results shed light on the complex interactions between cometary ions and the solar wind. An increase in gas production rate was shown to be significantly correlated with sharp drops in average molecular weight.
A gracious invitation was extended to us on 9/11/2002 AD, by the University of Tikrit / the Preparatory Committee, for a symposium (Sheikh Daoud Al-Tikriti, and his Scientific Effects), to participate in it.
The symposium was scheduled to be held on the 25th and 26th of March 2003 AD, but God Almighty decreed that our country be occupied, so the Preparatory Committee set another date for the symposium on 10/21/2003 AD.
It was not possible for the symposium to be held until 25-26/4/2004 AD, and many researchers attended, who were assigned to investigate some manuscripts of Sheikh Dawood (may God have mercy on him) or to write about his personal and scientific biography.
And God (Glory be to Him) did not enable us to attend, becau
There is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show MoreThis study aims to analyze the messages of a number of global news outlets on Twitter. In order to clarify the news outlets tactics of reporting, the subjects and focus during the crisis related to the spread of the Covid-19 virus. The study sample was chosen in a deliberate manner to provide descriptive results. Three news sites were selected: two of the most followed, professional and famous international news sites: New York Times and the Guardian, and one Arab news site: Al-Arabiya channel.
A total of 18,085 tweets were analyzed for the three accounts during the period from (1/3/2020) to (8/4/2020). A content analysis form was used to analyze the content of the news coverage. The results indicate an increase in th
... Show MoreAbstract Background: One of the most important methods to replace lost teeth is dental implants. In order to increase the strength of connection of the implant with the jaw bone to provide early loading after placement, implant is coated by different coating materials that achieved that purpose. The aim of this study was to evaluate the influence of coating CP Ti implant with calcium carbonate on the strength of bone-implant interface after two and six weeks of implantation in rabbit femur bone by torque removal test, histological and histomorphometric analysis. Materials and methods: Coating the surface of commercially pure titanium screws with extra pure synthetic calcium carbonate via electrophoretic deposition method (EPD) was done. The
... Show MoreThe free Schiff base ligand (HL1) is prepared by being mixed with the co-ligand 1, 10-phenanthroline (L2). The product then is reacted with metal ions: (Cr+3, Fe+3, Co+2, Ni+2, Cu+2 and Cd+2) to get new metal ion complexes. The ligand is prepared and its metal ion complexes are characterized by physic-chemical spectroscopic techniques such as: FT-IR, UV-Vis, spectra, mass spectrometer, molar conductivity, magnetic moment, metal content, chloride content and microanalysis (C.H.N) techniques. The results show the formation of the free Schiff base ligand (HL1). The fragments of the prepared free Schiff base ligand are identified by the mass spectrometer technique. All the analysis of ligand and its metal complexes are in good agreement with th
... Show MoreABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine
... Show MoreNew Azo ligands HL1 [2-Hydroxy-3-((5-mercapto-1,3,4-thiadiazol-2-yl)diazenyl)-1-naphth aldehyde] and HL2 [3-((1,5-Dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-yl)diazenyl)-2-hydroxy-1-naphthaldehyde] have been synthesized from reaction (2-hydroxy-1-naphthaldehyde) and (5-amino-1,3,4-thiadiazole-2-thiol) for HL1 and (4-amino-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one) for HL2. Then, its metal ions complexes are synthesized with the general formula; [CrHL1Cl3(H2O)], [VOHL1(SO4)] [ML1Cl(H2O)] where M = Mn(II), Co(II), Ni(II) and Cu(II), and general formula; [Cr(L2)2 ]Cl and [M(L2)2] where M = VO(II), Mn(II), Co(II), Ni(II) and Cu(II) are reported. The ligands and their metal complexes are characterized by phisco- chemical spectroscopic
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
This study concerns a new type of heat exchangers, which is that of shell-and-double concentric tube heat exchangers. The case studies include both design calculations and performance calculations.
The new heat exchanger design was conducted according to Kern method. The volumetric flow rates were 3.6 m3/h and 7.63 m3/h for the hot oil and water respectively. The experimental parameters studied were: temperature, flow rate of hot oil, flow rate of cold water and pressure drop.
A comparison was made for the theoretical and experimental results and it was found that the percentage error for the hot oil outlet temperature was (- 1.6%). The percentage
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More