This paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl measurement method has the most accuracy in calculating SFR as it depends on the redshift where the relationship between them is direct. while the other distance method (dm) depends on absolute blue magnitude (MB), it was somewhat less accurate, but the two methods are helpful for this type of calculation.
The self-evident truth existing in today's business environment is the continuity of change and its continuity and turmoil, also its increase over time as it is more abundant, abundant, wide and complex than ever before, and it is the dominant feature in the business environment, as different organizations and operating units can find themselves shifting from the top to the bottom. And then it requires its departments to strive to adapt to these rapid and turbulent shifts and changes by bringing about a series of organizational and adaptive changes that are not limited to one organizational aspect only but rather include all organizational components. Accordingly, this research came to determine the readiness of public organizations to chan
... Show MoreThe water injection of the most important technologies to increase oil production from petroleum reservoirs. In this research, we developed a model for oil tank using the software RUBIS for reservoir simulation. This model was used to make comparison in the production of oil and the reservoir pressure for two case studies where the water was not injected in the first case study but adding new vertical wells while, later, it was injected in the second case study. It represents the results of this work that if the water is not injected, the reservoir model that has been upgraded can produce only 2.9% of the original oil in the tank. This case study also represents a drop in reservoir pressure, which was not enough to support oil production
... Show MoreBACKGROUND: Burkholderia cepacia adhesion and biofilm formation onto abiotic surfaces is an important feature of clinically relevant isolates. The in vitro biofilm formation of B. cepacia onto coated indwelling urinary catheters (IDCs) with moxifloxacin has not been previously investigated. OBJECTIVES: To examine the ability of B. cepacia to form biofilms on IDCs and the effect of coating IDCs with moxifloxacin on biofilm formation by B. cepacia in vitro. MATERIAL AND METHODS: The adhesion of B. cepacia to coated and uncoated IDCs with moxifloxacin was evaluated. Pieces of IDCs were coated with moxifloxacin (adsorption method). The spectrophotometric method was used to check moxifloxacin leaching into tubes. Coated and uncoated tubes were i
... Show MoreIn this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .
The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreThe com pton profiles for Ti02 have been measured using a SCi
Am-241 compton spectrometer .A pellet of the oxide was prepared from a polycrystalline powder having a thickness of 1.54 mm ,about J 00000 counts have been accumulated at the compton peak
.Theoreti cal compton profiles have been calculated for different ionic anangements using free atom compton profile for the core electrons.The theoretical and experimental results ahrce well for (Ti/4(0 .2 arrangement which support complete transfer of valence electrons from metal to oxygen ions, i.e., full ionic &nbs
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreCarbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h
... Show MoreIn this paper, the method of estimating the variation of Zenith Path Delay (ZPD) estimation method will be illustrate and evaluate using Real Time Kinematic Differential Global Positioning System (RTK-DGPS). The GPS provides a relative method to remotely sense atmospheric water vapor in any weather condition. The GPS signal delay in the atmosphere can be expressed as ZPD. In order to evaluate the results, four points had been chosen in the university of Baghdad campus to be rover ones, with a fixed Base point. For each rover position a 155 day of coordinates measurements was collected to overcome the results. Many models and mathematic calculations were used to extract the ZPD using the Matlab environment. The result shows that the ZPD valu
... Show More