Background/objectives: To study the motion equation under all perturbations effect for Low Earth Orbit (LEO) satellite. Predicting a satellite’s orbit is an important part of mission exploration. Methodology: Using 4th order Runge–Kutta’s method this equation was integrated numerically. In this study, the accurate perturbed value of orbital elements was calculated by using sub-steps number m during one revolution, also different step numbers nnn during 400 revolutions. The predication algorithm was applied and orbital elements changing were analyzed. The satellite in LEO influences by drag more than other perturbations regardless nnn through semi-major axis and eccentricity reducing. Findings and novelty/improvement: The results demonstrated that when m for Runge–Kutta’s method is large; the perturbed value for orbital element considers more acceptable. Furthermore, as nnn increases the step will reduce.
Utilizing the modern technologies in agriculture such as subsurface water retention techniques were developed to improve water storage capacities in the root zone depth. Moreover, this technique was maximizing the reduction in irrigation losses and increasing the water use efficiency. In this paper, a polyethylene membrane was installed within the root zone of okra crop through the spring growing season 2017 inside the greenhouse to improve water use efficiency and water productivity of okra crop. The research work was conducted in the field located in the north of Babylon Governorate in Sadat Al Hindiya Township seventy-eight kilometers from Baghdad city. Three treatments plots were used for the comparison using surface
... Show MoreThe primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes
This study aims to prepare educational sessions for the strategy (team-pair-solo) in practical volleyball lessons for female students and identifying its effect on learning the accuracy of the spiking skill in volleyball. An experimental design with experimental and control groups was employed on a purposive sample of (30) female students who were to constitute (42.254%) from their community represented by the sophomores at the College of Physical Education and Sports Sciences for Girls / University of Baghdad who are in good standing in the morning study for the academic year (2022-2023), whose total number is (71) students. According to the determinants of the experimental design, participants were divided into two equal groups, a
... Show MorePathological blood clot in blood vessels, which often leads to cardiovascular diseases, are one of the most common causes of death in humans. Therefore, enzymatic therapy to degrade blood clots is vital. To achieve this goal, bromelain was immobilized and used for the biodegradation of blood clots. Bromelain was extracted from the pineapple fruit pulp (Ananas comosus) and purified by ion exchange chromatography after precipitation with ammonium sulphate (0-80 %), resulting in a yield of 70%, purification fold of 1.42, and a specific activity of 1175 U/mg. Bromelain was covalently immobilized on functionalized multi-walled carbon nanotubes (MWCNT), with an enzyme loading of 71.35%. The results of the characterization of free and immobilized
... Show MoreY Adnan, H Atiyah, IH Neamah…, International Development Planning Review, 2024
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More