Background/objectives: To study the motion equation under all perturbations effect for Low Earth Orbit (LEO) satellite. Predicting a satellite’s orbit is an important part of mission exploration. Methodology: Using 4th order Runge–Kutta’s method this equation was integrated numerically. In this study, the accurate perturbed value of orbital elements was calculated by using sub-steps number m during one revolution, also different step numbers nnn during 400 revolutions. The predication algorithm was applied and orbital elements changing were analyzed. The satellite in LEO influences by drag more than other perturbations regardless nnn through semi-major axis and eccentricity reducing. Findings and novelty/improvement: The results demonstrated that when m for Runge–Kutta’s method is large; the perturbed value for orbital element considers more acceptable. Furthermore, as nnn increases the step will reduce.
Y Adnan, H Atiyah, IH Neamah…, International Development Planning Review, 2024
This research was conducted in order to monitor and measure the dimensions of media policy in satellite channels directed from the point of view of the communicator, and this research is classified among the descriptive studies, as the researcher used the survey method to answer the questions that were formulated in light of the research problem represented by the main question: What are the dimensions of media policy in Directed satellite channels? .
To achieve the objectives of the study, the researcher used the following tools:
The questionnaire, in order to survey the attitudes of communicators about the extent to which the media policy during crises reflects on their professional standards. The research community is represente
This study aims to prepare educational sessions for the strategy (team-pair-solo) in practical volleyball lessons for female students and identifying its effect on learning the accuracy of the spiking skill in volleyball. An experimental design with experimental and control groups was employed on a purposive sample of (30) female students who were to constitute (42.254%) from their community represented by the sophomores at the College of Physical Education and Sports Sciences for Girls / University of Baghdad who are in good standing in the morning study for the academic year (2022-2023), whose total number is (71) students. According to the determinants of the experimental design, participants were divided into two equal groups, a
... Show MoreOur research sheds light on one of the most important aspects of David Grossman's play, "Ricky's Garden, גן ריקי " which is characterized by its realistic portrayal of characters. Grossman gradually moves towards the inner awareness of his characters, expressing their emotions and thoughts through conversations and emotional conflicts, referring to their past and rooted background. Grossman transformed the main subject of his play (psychological depth) into a presentation and arrangement of all the elements of the play in a way that expresses emotional nature more powerfully by each child in the garden. This is reflected in their actions and words, making Grossman's works suitable for study and always of interest to specialized resear
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More The research addresses the most important elements of the ancient Iraqi heritage represented by architecture and plastic arts being the direct means that preserved the heritage due to the ease of preserving them and the speed of circulating them and diversity of their topics. Through the features of these elements, the research problem has been defined in the form of questions including: what are the most important elements of the ancient Iraqi heritage? What are the plastic arts? What are the most important topics adopted? What is the concept of palm in the ancient Iraqi heritage? What is the evidence for that?
Has it been employed in the Iraqi contemporary art? What is the evidence for that? How to employ it in the arts and t
In Iraq, water shortages and drought, especially during the hot summer months, necessitates that municipal authorities adopt water reuse projects like reusing treated domestic wastewater for crop irrigation. This work gives the conceptual and basic design elements for the necessary steps of filtration, UV irradiation and chlorination to make such a wastewater fit for agricultural use. A typical rural community of 50,000 people is considered as an example case for which functionality and relative simplicity of the proposed designs are prime factors. The objectives are 1) to show what is required and 2) that the presented information may be utilized to embark on the following phases of detailed design and execution of such projects.