The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
The present study aims to evaluate the biosorption of reactive orange dye by using garden grass. Experiments were carried out in a batch reactor to obtain equilibrium and thermodynamic data. Experimental parameters affecting the biosorption process such as pH, shaking time, initial dye concentrations, and temperature were thoroughly examined. The optimum pH for removal was found to be 4. Fourier transform infrared spectroscopy analysis indicated that the electronegative groups on the surface of garden grass were the major groups responsible for the biosorption process. Four sorption isotherm models were employed to analyze the experimental data of which Temkin and Pyzhey model was found to be most suitable one. The maxim
... Show MoreThe research aims to know the impact of science, technology, engineering, and mathematics education on both creative thinking and mathematical achievement. To achieve it, the two researchers followed the quasi-experimental approach with an experimental design for two groups, one experimental and the other a control. The research sample consisted of (32) female students from the fourth scientific grade in Al-Intisar Preparatory School for Girls/ AlRasafa, First Directorate. The sample was chosen intentionally and was divided into two groups: a control group studying by the traditional method, their number (16), and an experimental group that applied the STEM approach, their number also (16). There was parity between the two research groups i
... Show MorePublic spending represents the government’s financial leverage and has a significant impact on real and monetary economic variables, and one of these effects is the effect of public spending on the exchange rate as an important monetary variable for monetary policy, As we know that public spending in Iraq is financed from oil revenues sold in US dollars, and the Ministry of Finance converts the US dollar into Iraqi dinars to finance the government's need to spend within the requirements and obligations of the state's general budget, And converting the US dollar into Iraqi dinars has an impact on the parallel exchange market, even if there is a contractual exchange rate between the Ministry of Finance and the Central Bank of Iraq to
... Show Morepaid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w
... Show MoreSince I live in a society in which violence has become widespread, and killing among its own people flared up till they began to kill under the excuse of taking shelter, in these pages I would like to explain the status of taking shelter in the light of Islamic Law (Sharia), exploring scholars’ opinions in the legitimacy or illegitimacy of this issue according to the legal standards.
And, to acquaint people, and myself in the first place, with the true nature and the gravity of this issue; to expose it to those who are unaware of it; to remind those who are already aware of it. I would refute the fabrications, remove the suspicions which surround it untill it made the forbidden permissible; the wrong right. I would explain to those
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show MoreHow I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThe present work involved synthesis of new thiozolidinone derivatives,These derivatives could be divided into three type of compounds; quinolin-2-one[V]a,b ,Schiff bases[VI]a,b and imide compounds[VII]a-d. The reaction p-Hydroxyacetophenone with thiosemicarbazide led to formation thiosemicarbazon compound [II], the reacted of thiosemicarbazone with chloro acetic acid in CH3CO2Na led to yield 4- thiazelidinone compound[III] in addition, thiosemicarbazide was POCl3 to [III] give [IV] compound used intermediates to synthesis new compounds of reacted with two type of coumarin in glacial acetic acid to give quinolin-2-one[V]a,b, The later compound refluxing with different benzaldehyde in dry benzene and glacial acetic acid give Schiff bases[VI]a
... Show More