Abstract Planetary nebulae (PN) represents the short phase in the life of stars with masses (0.89-7) M☉. Several physical processes taking place during the red giant phase of low and intermediates-mass stars. These processes include :1) The regular (early ) wind and the envelope ejection, 2) The thermal pulses during Asymptotic Giant Branch (AGB ) phase. In this paper it is briefly discussed how such processes affect the mass range of Planetary Nebulae(PN) nuclei(core) and their evolution, and the PN life time, and fading time for the masses which adopted. The Synthetic model is adopted. The envelope mass of star (MeN ) and transition time (ttr) calculated respectively for the parameter (MeR =1.5,2, 3×10-3 M☉). Another time scale is of capital importance for the understanding of PN and their nuclei, it is the fading time ( tf). The results indicated that for each observed nebulae( ttr < tPN) also the fading time is sensitive to mass core(MH) of star, the mass with 1.2 M☉ takes only (25 yr ) to fading, while the mass with (0.66 M☉) takes about ( 4715 yr) years to fading. The calculations showed that (ttr) increases with the increasing of final mass( Mf). The initial nebulae radius will also increase with (Mf) thus will correlate with the location of nucleus on the HR diagram.
Sara and other kid's Agony: - Back to Innocence to Save Iraq
In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show MoreAn accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show More