The actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.
The research involves preparing gold nanoparticles (AuNPs) and studying the factors that influence the shape, sizes and distribution ratio of the prepared particles according to Turkevich method. These factors include (reaction temperature, initial heating, concentration of gold ions, concentration and quantity of added citrate, reaction time and order of reactant addition). Gold nanoparticles prepared were characterized by the following measurements: UV-Visible spectroscopy, X-ray diffraction and scanning electron microscopy. The average size of gold nanoparticles was formed in the range (20 -35) nm. The amount of added citrate was changed and studied. In addition, the concentration of added gold ions was changed and the calibration cur
... Show MoreThis work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreIn a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u
... Show MoreIn recent decades, tremendous success has been achieved in the advancement of chemical admixtures for Portland cement concrete. Most efforts have concentrated on improving the properties of concrete and studying the factors that influence on these properties. Since the compressive strength is considered a valuable property and is invariably a vital element of the structural design, especially high early strength development which can be provide more benefits in concrete production, such as reducing construction time and labor and saving the formwork and energy. As a matter of fact, it is influenced as a most properties of concrete by several factors including water-cement ratio, cement type and curing methods employed.
Because of acce
Our dear country faces many and varied challenges aimed at its history, civilization, its people, the scourge of drugs and psychotropic substances and their misuse. Therefore, we have a historical, ethical and professional responsibility to coordinate efforts and cooperation between all concerned to protect the Iraqi society from the threat of this scourge. Creative sources have varied in the variety of expressive means in politics, literature and the arts, in their style and technical treatment of various topics with innovative manifestations and intuitive interactive with visions as well as influences Psychological expressive descriptions of visual scene, it is one of the media and propaganda that contribute to the raising and developm
... Show More2-(2-amino-5-nitro-phenylazo),-phenol was ready by grouping the diazonium salt of 2-aminophenol with 4-nitroaniline.Thegeometry of azo ligand(HL)was resolved on the origin of (C.H.N) analysis,1H and 13CNMR spectra, infrared spectra and UV–vis electronic absorption spectra. Dealing with the azo ligand produced with Rh+3 and La+3ataqueous ethanol for a 1:3 metal: ligand rate, and in perfect ph. The formation for compounds have been described by utilizing flame atomic, absorption,(C.H.N),Analyses, conductivity, infrared spectra and UV–vis spectral procedures. Nature in the produced compounds, have been studied, obey the ratio of mole and continuous, variance, manners, Beer's law, yielded up a concentration, rate (1×10-4- 3×10-4M),. High
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More