This research aims to investigate the color distribution of a huge sample of 613654 galaxies from the Sloan Digital Sky Survey (SDSS). Those galaxies are at a redshift of 0.001 - 0.5 and have magnitudes of g = 17 - 20. Five subsamples of galaxies at redshifts of (0.001 - 0.1), (0.1 - 0.2), (0.2 - 0.3), (0.3 - 0.4) and (0.4 - 0.5) have been extracted from the main sample. The color distributions (u-g), (g-r) and (u-r) have been produced and analysed using a Matlab code for the main sample as well as all five subsamples. Then a bimodal Gaussian fit to color distributions of data that have been carried out using minimum chi-square in Microsoft Office Excel. The results showed that the color distributions of the main sample and all subsamples are bimodal. This indicates that the color distribution is an ideal tool to differentiate between young and old galaxies. The young and blue star-forming galaxies are represented by one of the two peaks, while the old and red non-star-forming galaxies are represented by the other peaks of the color distribution.
The shift that caused the fading art schools and the brightness of the other, which dictate the work of art based surface and defect lasting regeneration led the researcher to stop at the color of his study, as an element of fixed and mobile at the same time, hard as a lieutenant of the painting plastic and brick construction that supports a painting, The variable that follows the doctrine of the artist and the philosophy of the community, because of the extrapolation of his biography, especially in modern art and beyond is clear that compose a variety of ways and so as to ensure continuity vital to the process of drawing, color in all modes is responsible for editing shapes on the surface imaging is, without a line, shape and dimensions
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
This Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th
... Show MoreExcessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreIn this paper, for the first time we introduce a new four-parameter model called the Gumbel- Pareto distribution by using the T-X method. We obtain some of its mathematical properties. Some structural properties of the new distribution are studied. The method of maximum likelihood is used for estimating the model parameters. Numerical illustration and an application to a real data set are given to show the flexibility and potentiality of the new model.
No. Due to their apparently extreme optical to X-ray properties, Narrow Line Seyfert 1s (NLSy1s) have been considered a special class of active galactic nuclei (AGN). Here, we summarize observational results from different groups to conclude that none of the characteristics that are typically used to define the NLSy1s as a distinct group – from the, nowadays called, Broad Line Seyfert 1s (BLSy1s) – is unique, nor ubiquitous of these particular sources, but shared by the whole Type 1 AGN. Historically, the NLSy1s have been distinguished from the BLSy1s by the narrow width of the broad Hb emission line. The upper limit on the full width at half maximum of this line is 2000kms−1 for NLSy1s, while in BLSy1s it can be of several thousands
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The theater has a living environment that resembles or realistically simulates the real life environment on the stage where we see the place, light and living being as elements representing a picture of the life scene and for a period of time the theater merely conveyed that image, but with the development of the world industrially and technologically, the perception of this picture has evolved with the emergence of intellectual progress where each part has advantages and Philosophical goals that are consistent with the evolution of form. The theatrical lighting, colors and landscapes have become parts in the composition of a new life component in form and content and based on the above this research is titled&nbs
... Show More