The study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The circular velocity and super circular velocity are used in this work as initial values. From results we noted the skip entry type has longer flight time compared with other types, and the velocity vehicle is lower at high layer for earth atmosphere, where the density of air is very low. Therefore the skip entry is suitable for space shuttle during entry from space
Background: Non-host-adapted Salmonella serovar Typhimurium is a facultative intracellular bacterium, which invades and multiplies within mononuclear phagocytes in liver, spleen, lymph nodes and Peyer’s plaques. Salmonella infection is a crucial medical and veterinary problem globally. S. Typhimurium causes various clinical symptoms, from asymptomatic infection to typhoid-like syndromes in infants or highly susceptible animals, for instance mice. Objective: The present study was carried out to investigate the efficacy of anthrax protective antigen (PA)as a potent adjuvant mixed with killed Salmonella Typhimurium (S.T.) to enhance the immunization capacity of the last. Materials and Methods: Two groups of mice were immunized with either th
... Show MoreIn the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational
... Show MoreThe use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 from Al-
... Show MoreThe study aimed at the following:
Identify the differences in average scores core thinking skills kindergarten children by variable sex (male - female), and by variable age (5.6 - 5.11).
To achieve this researcher adopted a standardized test of core thinking skills for the kindergarten children, which was built and standardization by the researcher Meyada Asaad Mussa 2012 . applied test on a sample of (814) ) boys and girls who were randomly chosen form, from directorates of Baghdad Education Adoption of the proportional distribution.
... Show More
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More