Preferred Language
Articles
/
bsj-942
Polar Gap Properties for Neutron StarWithin Light Cylinder Limits
...Show More Authors

The huge magnetic fields of neutron star cause the nuclei of the stellar surface to form a tightly bound condensed layer. In this research some characteristics of polar gap and magnetosphere enclosed the star according to Sturrock Model were illustrated, positrons move out along the open field lines, and electrons flow to the stellar surface as in the related to Sturrock model. The magnetic field within polar gap areas, which is defined by the Irvin Radius (RL) decreases due to the expansion of the polar, resulting from the physical motion of the accreted material. The values of height gap at different distances from the star were estimated. The obtained results improve the most energetic positrons those with E? Emax radiate away their energy in a distances re = 104m above the polar gap while less energetic positrons produced at much greater distances re =108m. The potential drop across the polar gap is obtained using a well defined adopted formula, it is found that the potential drop across the polar gap grows like (h2), when h « rp

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 20 2018
Journal Name
Www.intechopen.com
Internet of Things (IoT) for Automated and Smart Applications
...Show More Authors

Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u

... Show More
View Publication
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Active Alumina Extraction from Iraqi Bauxite for Catalyst's Support
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Rules for dealing with the offender in Islamic thought
...Show More Authors

Research summary

Today, the Islamic nation is going through a phase that is one of the most dangerous that it has never experienced before. This phase was characterized by the following:

The nation is divided into states and its weakness in most of its doctrinal, political, social, economic and moral aspects.
Enemies targeting the nation's faith and capabilities, and the emergence of loyalty to the enemies of the nation from some groups of society, spreading misconceptions in the Muslim community.
Spreading the spirit of rebellion in all segments of society and striving to stir up the people against the rulers and put pressure on the rulers.

All these manifestations and others require the nation's wise men

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2024
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 30 2024
Journal Name
Academia Open
Positioning Preterm Newborns for Cardiorespiratory Stability A Global Insight
...Show More Authors

Publication Date
Wed Jul 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Assessing BIM Integration with Sustainable Requirement for Buildings Construction
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering And Applied Sciences
Design and Implementation of Electronic Infrastructure for Academic Establishment
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jun 06 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Some parameters for the resize graph of G2(4)
...Show More Authors

Topological indices provide important insights into the structural characteristics of molecular graphs. The present investigation proposes and explores a creative graph on a finite group G, which is known as the RIG. This graph is designated as ΓRS G2(4) indicating a simple undirected graph containing elements of G. Two distinct ertices are regarded as nearly the same if and only if their sum yields a non-trivial involution element in G. RIGs have been discovered in various finite groups. We examine several facets of the RIG by altering the graph through the conjugacy classes of G. Furthermore, we investigate the topological indices as applications in graph theory applying the distance matrix of the G2(4) group.

View Publication
Scopus Clarivate Crossref