Preferred Language
Articles
/
yxd7opEBVTCNdQwCG5ac
THE EVOLUTION OF PLANETARY NEBULAE(PN) AND FADING TIME ACCORDING TO SYNTHETIC MODEL
...Show More Authors

Abstract Planetary nebulae (PN) represents the short phase in the life of stars with masses (0.89-7) M☉. Several physical processes taking place during the red giant phase of low and intermediates-mass stars. These processes include :1) The regular (early ) wind and the envelope ejection, 2) The thermal pulses during Asymptotic Giant Branch (AGB ) phase. In this paper it is briefly discussed how such processes affect the mass range of Planetary Nebulae(PN) nuclei(core) and their evolution, and the PN life time, and fading time for the masses which adopted. The Synthetic model is adopted. The envelope mass of star (MeN ) and transition time (ttr) calculated respectively for the parameter (MeR =1.5,2, 3×10-3 M☉). Another time scale is of capital importance for the understanding of PN and their nuclei, it is the fading time ( tf). The results indicated that for each observed nebulae( ttr < tPN) also the fading time is sensitive to mass core(MH) of star, the mass with 1.2 M☉ takes only (25 yr ) to fading, while the mass with (0.66 M☉) takes about ( 4715 yr) years to fading. The calculations showed that (ttr) increases with the increasing of final mass( Mf). The initial nebulae radius will also increase with (Mf) thus will correlate with the location of nucleus on the HR diagram.

Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Strategic leadership skills as a moderate of the impact of environmental challenges on effective management of the environment according to the model (VUCA Prime)
...Show More Authors

Purpose – The main purpose of this research is to highlight the main role of strategic leadership skills for top managements in accessing to effective management in accordance with the (VUCA Prime) methodology in (VUCA) environment as Miniature virtual environment, which refers to (Volatility), (Uncertainty), (Complexity), and (Ambiguity).

methodology – To achieve the research objective, this study selected the quantitative approach in research design, Questionnaire was used as the main instrument for data collection, the sample comprised the opinion poll (106) individual who functions as a head department. (Structural equation modelling by (Smart Pls3)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adsorption Kinetic and Thermodynamic Study of Congo Red Dye on Synthetic Zeolite and Modified Synthetic Zeolite
...Show More Authors

   Linde Type-A (LTA) zeolite was modified by adding  lead sulfide into cavities of zeolite. The zeolite and zeolite –pbs  were characterized by FTIR, XRD, AFM and SEM. The adsorption of congo red (CR)  dye  from aqueous solution by zeolite and zeolite – pbs were studied. Different parameters like contact time, temperature and concentration of (CR) dye were investigated. The results show that at contact time of 45, 30 min for maximum adsorption of (CR) dye onto zeolite and zeolite -pbs respectively were observed. The kinetic data was analyzed using pseudo-first-order and pseudo-second-order kinetic models. The adsorption kinetics of (CR) dye  were fitted well with the pseudo-second-order k

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Time in the Cinema...The Two Films (The Knife and The Deceived) -A Model: كريمة ناوي
...Show More Authors

This study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun).  If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world,   the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 03 2018
Journal Name
Opcion
Evaluating the financial performance according to the traditional and modern financial indicators
...Show More Authors

The research aims to develop the general performance and improve the level of activity of private insurance companies in line with the current progress of the country. Besides, Evaluating financial performance to diagnose weaknesses and strengths in sample research companies and then developing appropriate solutions. The deviation in the financial performance of the research sample was revealed by measuring the various accounts of the company. The research sample included five companies in the private insurance sector listed in the Iraqi Stock Exchange Market, which represent the private insurance sector. The research concluded that the added economic value is a broad concept that goes beyond the traditional performance evaluation process a

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Typical Federal Budget According to the budget performance
...Show More Authors

The purpose of this research that, the performance budget  is the best style of budget styles that can help and contribute in forming preparing federal typical budget in Iraq , By taking advantage of the application of the principles of scientific rules that would ensure optimal allocation and investment of the financial resources of the state and achieve the best performance and the lowest possible cost, both with regard to the administrative and accounting side, reducing the waste of public money, so that can enhance the success , power , and safety of financial activity of managerial system that it focuses on the magnetite and quality of the work done and the objectives wanted to meet. so application of performance budget require

... Show More
View Publication
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
LDPC CODED MULTIUSER MC-CDMA PERFORMANCE OVERMULTIPATH RAYLEIGH FADING CHANNEL
...Show More Authors

This work presents the simulation of a Low density Parity Check (LDPC) coding scheme with
multiuserMulti-Carrier Code Division Multiple Access (MC-CDMA) system over Additive White
Gaussian Noise (AWGN) channel and multipath fading channels. The decoding technique used in
the simulation was iterative decoding since it gives maximum efficiency with ten iterations.
Modulation schemes that used are Phase Shift Keying (BPSK, QPSK and 16 PSK), along with the
Orthogonal Frequency Division Multiplexing (OFDM). A 12 pilot carrier were used in the estimator
to compensate channel effect. The channel model used is Long Term Evolution (LTE) channel with
Technical Specification TS 25.101v2.10 and 5 MHz bandwidth including the chan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Educational Performance according to Centralization and Decentralization
...Show More Authors

The research aims to identify the effect of applying administrative decentralization to an educational performance by assessing educational performance before and after the process of transferring powers from the federal government (the Iraqi Ministry of Education) to local governments (governorates) as well as identifying the appropriate central or decentralized administrative system to advance the educational reality and performance. To achieve the goal of the research, educational data was collected and analyzed, as well as the measurement of educational performance indicators and analysis during two phases, the first represents the stage of applying the central system and spanned between the academic year (2011-2012) and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
Sections of monotheism and its types according to Sufism
...Show More Authors

Praise be to God, Lord of the Worlds, who has made His way for His servants who know in the depths and who are devoted to Him at all times and times, so He has delivered to Himself their pain from two exiles, and His prayers and peace are the perfect trust in the presence of the pearl of charity of existence. Possessor of great intercession and praiseworthy status until the day of meeting and eternity, and upon his family and companions, the people of tomorrow, steadfastness, generosity, and generosity, and after that

For a long period of time, I have been asking myself: Why did he attack so many contemporary books, especially Sufism? Why this unlimited financial expenditure on printing, binding, beautifying and enticing readers?

... Show More
View Publication Preview PDF
Publication Date
Fri May 30 2025
Journal Name
Nasaq
The Effectiveness of The Proposed Teaching strategy According to The Common Knowledge Construction Model in The Achievement of Students of The Second intermediate grade in Mathematics
...Show More Authors

View Publication
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref