In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
In this paper we present a study on Peristaltic of fractional generalized Maxwell viscoelastic fluid through a porous medium. A modified Darcy-Brinkman model is utilized to simulate the flow of a generalized Maxwell fluid in a porous medium in an inclined channel with slip effect. The governing equation is simplified by assuming long wavelength and low Reynolds number approximations. The numerical and approximate analytical solutions of the problem are obtained by a semi-numerical technique, namely the homotopy perturbation method. The influence of the dominating physical parameters such as fractional Maxwell parameter, relaxation time, amplitude ratio, permeability parameter, Froude number, Reynolds number and inclination of channel on
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe properties of capturing of peristaltic flow to a chemically reacting couple stress fluid through an inclined asymmetric channel with variable viscosity and various boundaries are investigated. we have addressed the impacts of variable viscosity, different wave forms, porous medium, heat and mass transfer for peristaltic transport of hydro magnetic couple stress liquid in inclined asymmetric channel with different boundaries. Moreover, The Fluid viscosity assumed to vary as an exponential function of temperature. Effects of almost flow parameters are studied analytically and computed. An rising in the temperature and concentration profiles return to heat and mass transfer Biot numbers. Noteworthy, the Soret and Dufour number effect resul
... Show MoreThe aim of this work presents the analytical studies of both the magnetohydrodynamic (MHD) flux and flow of the non-magnetohydro dynamic (MHD) for a fluid of generalized Burgers’ (GB) withinan annular pipe submitted under Sinusoidal Pressure (SP)gradient. Closed beginning velocity's' solutions are taken by performing the finite Hankel transform (FHT) and Laplace transform (LT) of the successivefraction derivatives. Lastly, the figures were planned to exhibition the transformations effects of different fractional parameters (DFP) on the profile of velocity of both flows.
Background: Moyamoya disease (MMD) is a rare cerebrovascular disease characterized by bilateral stenosis starting at the supraclinoid internal carotid artery (ICA), with the development of a collateral network of vessels. It is an established cause of stroke in the pediatric age group. Despite its increasing prevalence in various parts of the world, it remains largely underrecognized in the Middle East, particularly in Iraq. This is the first case of MMD in an Iraqi patient undergoing surgery. Case description: A 12-year-old boy presents with a 3-months history of progressive behavioural changes. MRI revealed diffuse infarcts of different ages. MRA and CT angiography revealed extensive asymmetrical steno-occlusive changes of t
... Show MorePlentiful of healthcare practice is based on a disease/treatment approach rather than a prevention one. That is, the predominant focus is on treating existing symptoms and conditions that bring the patient to healthcare setting. There is no doubt about the significance of this approach for acute conditions, but there is some question whether this is the most efficient and effective way of distributing healthcare for increasing number of diseases and limited resources.
The evidences from everywhere have showed the profound cost benefit of prevention in healthcare practice. Healthy community, therefore, is the ultimate aim in any health services planning. The priority of care giver is shifted now to promote health and prevent
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreMammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by lo
... Show MoreIn this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.