|
One of the most powerful tools for any stellar dynamics is the N-body simulation. In an N-body simulation the motion of N particles is followed under their mutual gravitational attraction. In this paper the gravitational N-body simulation is described to investigate Newtonian and non- Newtonian (modified Newtonian dynamics) interaction between the stars of spiral galaxies. It is shown that standard Newtonian interaction requires dark matter to produce the flat rotational curves of the systems under consideration, while modified Newtonian dynamics (MOND) theorem provides a flat rotational curve and gives a good agreement with the observed rotation curve; MOND was tested as an alternative to the dark matter hypothesis. So that MOND hypothesis has generated better rotation curves than Newtonian theorem. |
In the present work, the image and representation of Adela, the youngest daughter of the family of the Casa de Bernarda Alba, one of the most popular works of the Spanish author Federico García Lorca (1898-1936), will be analyzed. In this work, there are different themes, but what concerns us is to show the repression, oppression and rebellion of this character in a context of customs of the 1920s in Spain. They are revealing elements in that period in which women were relegated to the background, despite the fact that a feminist movement had already begun in Spain. By studying Adela, we seek to see how a single woman confronts her family and the society that surrounds her to fight for freedom, although its end is finally linked to
... Show MoreSince the beginning of the second decade of the twenty-first century, Saudi Arabia tried to pursue an open foreign policy towards many countries in the Horn of Africa, especially with Ethiopia and Somalia, due to the geostrategic qualities that these two countries possess.Despite the development of Saudi foreign policy towards Ethiopia and Somalia, it was soon affected by the tension after the events that the Gulf states went through, that is, the Qatari crisis with Saudi Arabia,especially after most of the countries of the Horn of Africa adhered to a policy of neutrality towards the Gulf-Gulf crisis.
Thus it is expected that despite the geographical proximity and the historical, economic and political relations between Saudi Ara
... Show MoreThe research aims to shed light on the role of E-Audit in raising Independence and professional competence of the external auditor, the study has been applied on a sample of the branches of the Rafidain Bank n have been addressed research topic beside the theoretical, as put forward by the literature of accounting, audit and that the contents of the section first, either the practical side was required to test the hypotheses use form questionnaire, which was distributed to a sample of the external auditors and bankers research sample. He has applied for his part in the search for a standard of independence and professionalism of the external auditor and the factors influencing these standards, and the most import
... Show MoreBackground: One of the unique prosthesis for tooth or teeth replacement is the dental implant. Our attempt is using a biomaterial system that is easily obtained and applicable and has the ability to provoke osteoinductive growth factor to enhance bone formation at the site of application. One of these natural polymers is hyaluronic acid. Material and methods: Sixty machined surface implants from commercially pure titanium rod inserted in thirty NewZealand rabbits. Two implants placed in both tibia of each rabbit. The animals scarified at 1, 2 and 4 weeks after implantation (10 rabbits for each interval). For all of animals the right tibia’s implant was control (uncoated) and the left one was experimental (coated with 0.1ml Hyaluro
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe study aimed to measure the effect of applying the disclosure and transparency standards criteria adopted by the Saudi Arabian Monetary Authority on improving performance indicators in the Saudi banking sector, by measuring the extent of the impact of the bank's financial indicators represented by liquidity, profitability and return on assets in Saudi banks by applying the criteria of disclosure and transparency, which is one of the Main principles in the list of governance, which was approved by the Saudi Arabian Monetary Authority. The analytical approach was followed to achieve the goal of the study, as the financial statements of Saudi banks were analyzed during a period of 8-year to test four hypotheses related to measuri
... Show MoreIn this work, excess properties (eg excess molar volume (VE), excess viscosity (ȠE), excess Gibbs free energy of activation of viscos flow (ΔG* E) and molar refraction changes (ΔnD) of binary solvent mixtures of tetrahydrofurfuryl alcohol (THFA) with aromatic hydrocarbons (benzene, toluene and p-xylene) have been calculated. This was achieved by determining the physical properties including density ρ, viscosity Ƞ and refraction index nD of liquid mixtures at 298.15 K. Results of the excess parameters and deviation functions for the binary solvent mixtures at 298.15 K have been discussed by molecular interactions that occur in these mixtures. Generally, parameters showed negative values and have been found to fit well to Redlich-Kister
... Show More