This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percentage of the elements was determined relative to iron, where in comet Temple 1, the most significant percentage of the element ratio potassium to iron is K / Fe ~ 28.2%, while the lowest value is Ca / Fe ~ 1.3%. For the comet, 67P/Churyumov-Gerasimenko, the most significant percentage of the elements relative to iron is also for potassium, K / Fe ~ 89.5%; while the lowest value is Ni / Fe ~ 0.26. In general, comparing both comets, the greatest percentage of the elements relative to iron is K / F. Iron is the base element in the structure of both comets, followed by potassium.
Educational of the mind is a weapon to a different knowledges which
benefit in ife and developed the mind in many field and practice him in a
regular form in a right thinking and practice sense on exactly recognizing and
conception things which is senses and regulating the memory and providing
with benefit information which fit to minded of person,the present research
aimed at answering the following two questions:
1-Does the concept of mind differ with age?
2-Does the recognition on function of mind developed with development of
age?
The research population consisted of the children in the primary schools
of Baghdad/center,and the students of the Education for woman
college/Baghdad university for the age
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.
For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan
... Show MoreIrisin is a myokine that controls energy metabolism by making adipose tissue brown. The present goal in doing this research was to determine how irisin concentration relates to other biochemical markers of disease. Hemodialysis (HD) for chronic kidney failure. The study included 30 individuals with end-stage renal disease on HD and 30 healthy subjects as the control group. The ages of all patients and the control group ranged from (25 to 60) years. The excluded criteria included patients with viral hepatitis and diabetes. Serum irisin concentration and the level of fasting serum glucose (FSG), urea, creatinine (Cr), total protein (TP), albumin (Alb), albumin to creatinine ratio (ACR), total cholesterol (TC), alanine aminotransferase (ALT),
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreIntroduction The pathophysiology of appendicitis likely stems from obstruction of the appendiceal orifice leading to an increase in intraluminal and intramural pressure, resulting in small vessel occlusion and lymphatic stasis. Organ supplied by an end artery, such as the appendix, are more prone to the deleterious effects of arterial occlusion. The continuous cigarette smoking might be associated with a greater risk for developing atherosclerosis.
Objectives The aim is to evaluate the effect of cigarette smoking on the incidence of complications of acute appendicitis.
Methods Patients suffered from symptoms and signs suggesting a