The Plerion nebula is characterized by its pulsar that fills the center of the supernova remnant with radio and X-ray frequencies. In our galaxy there are nine naked plerionic systems known, of which the Crab Nebula is the best-known example. It has been studied this instance in order to investigate how the pulsar energy affect on the distribution and evolution of the remnant as well as study the pulsar kick velocity and its influence on the remnant. From the obtained results it's found that, the pulsar of the Crab Nebula injects about (2−3)𝑥 1047 erg of energy to the remnant, although this energy is small compared to the supernova explosion energy which is about 1051 erg but still plays a significant role in the distribution and the morphology as well as the dynamical expansion of the remnant. However, most of this energy is concentrate in the direction of the pulsar rotational dipole axis which makes the remnant expanding in this direction further than other regions and consequently has more density. Moreover, it's found that the pulsar kick velocity which is in order ≈110 km.s-1 also adds an expansion energy to the remnant in the direction of the kick (North West direction) added to its initial energy and due to this kick the pulsar will be shifts to the opposite direction of the kick the South East direction, which cause the pulsar to leave its birth position and finally leave the remnant itself.
The message of our Prophet Muhammad (peace and blessings of Allaah be upon him) was the most complete of the messages, and the conclusion of the messages and completed by the mercy of this nation. Al-Khalal al-Baghdadi al-Hanbali (may Allaah have mercy on him) was a scholar who updated his writings. And The Nha Brhnha and became an independent and arranged doctrine Such a world of Galilee Hambali must show his character and his knowledge and its impact on the Islamic arena.
Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreCommunication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p
This paper aims to find new analytical closed-forms to the solutions of the nonhomogeneous functional differential equations of the nth order with finite and constants delays and various initial delay conditions in terms of elementary functions using Laplace transform method. As well as, the definition of dynamical systems for ordinary differential equations is used to introduce the definition of dynamical systems for delay differential equations which contain multiple delays with a discussion of their dynamical properties: The exponential stability and strong stability
In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreBackground: Polycystic ovary syndrome (PCOS) has an unknown and complex etiology. It affects 5–10% of women in the reproductive age. Patients are known to have increased ovarian androgen production that is associated with decreased menses, hirsutism, and acne. Urinary tract stones (UTS) are a multifactorial disorder, with age and sex being known risk factors. Many PCOS patients are obese, and links between nephrolithiasis and obesity have been shown previously. Objectives: To identify the relation between PCOS and UTS considering the patients' body mass index (BMI). Methods: This is a cross-sectional study that enrolled 407 women aged 18-40 who attended the gynecology and obstetrics clinic at Al-Elwiya Maternity Teaching Hospital.
... Show MoreVehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c
... Show More