In this study, two active galaxies (NGC4725, NGC4639) have been chosen to study their morphological and photometric properties, by using the IRAF ISOPHOTE ELLIPS task with griz-filters. Observations are obtained from the Sloan Digital Sky Survey (SDSS) which reaches now to the DATA Release (DR14). The data reduction of all images (bias and flat field) has been done by SDSS Pipeline. The surface photometric investigation was performed like the magnitude. Together with isophotal contour maps, surface brightness profiles and a bulge/disk decomposition of the images of the galaxies, although the disk position angle, ellipticity, and inclination of the galaxies have been done. Also, the color of galaxies was studied, where chromatic distribution and extraction of chromatic processes were studied.
Forward-swept wings were researched and introduced to improve maneuverability, control, and fuel efficiency while reducing drag and they are often used alongside canards, to further enhance their characteristics. In this research, the effects of canard dihedral angles on the wing loading of a forward-swept wing in transonic flow conditions were studied, as the wing loading provides a measure of wing’s efficiency (lift/drag). A generic aircraft model from literatures was selected, simulated, and compared to, using CFD software ANSYS/Fluent where the flow equations were solved to calculate the aerodynamic characteristics. The research was carried at two different Mach numbers, 0.6 and 0.9, for five different canard dihedral angles which tra
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
Objectives:
To evaluate mothers’ attitudes toward readiness for discharge care at home for a premature baby in Intensive Care Unit at teaching hospitals in Medical City Complex and to find out the relationship between mothers’ attitudes and their socio-demographic characteristics.
Methodology: A quasi-experimental study design was carried out through the period of 6th January 2020 to 2021 to 11th March 2021, to evaluate mother’s attitude toward discharge care plan for premature babies. The study carried out in Welfare Teaching Hospital, Nursing Home Hospital and Baghdad Teaching Hospital at Medical City Complex in Baghdad City on 30 mother of premature babies in neonatal intensive care units using the nonprobability sampling
Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po
... Show MoreThe energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show MoreThe present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More