The equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the
... Show MoreThis research attempts to find the association between single nucleotide polymorphism (SNP) of IL2+166 gene (rs2069763) and type 2 diabetes mellitus (T2DM) in a sample of Iraqi patients. A total of 44 patients and 55 apparently healthy volunteers were genotyped for the SNP using polymerase chain reaction test. Three genotypes (GG, GT, and TT) corresponding to two alleles (G and T) were found to have SNP. Both study groups’ genotypes had a good agreement for the analysis of Hardy-Weinberg Equilibrium. The results revealed increased frequencies between the observed and expected GG and TT genotypes and IL2+166 SNP T allele in T2DM patients (40.9 vs. 40.0 %; OR = 1.04; 95% CI, 0.47 - 2.31), whereas the values in the control group were
... Show MoreThe wild populations of the vinegar fly Drosophila melanogaster Meigen from two regions in Baghdad , Saidiya and Tuwaitha were selected for this study to investigating the frequency of the dominant lethality , this parameter was investigated through fecundity and egg hatchability rate which considered as main indicator for the presence of mutation . The results showed that fecundity rate in Saidiya increased with time , so the lowest rate was 65.5 eggs per female in November and the highest was 87.4 eggs in May , the same results was observed for Tuwaitha except a significantly decrease in fecundity rate that was observed in May which was 42.7 eggs , as well as another significant differences between the two regions was observed in March
... Show MoreThe study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19