BACKGROUND: Chronic prostatitis/chronic pelvic pain syndrome (CP/CPPS) is common, yet no curative treatment identified. Cinnamon is a herbal substance, which has many applications in medicine. AIM: The aim of the study was to study the effect of cinnamon on patients with chronic pelvic pain syndrome. METHODS: Sixty patients with documented CP/CPPS randomized into two groups during 2018 and 2019 in Baghdad. The first group received 60 capsules each contained 1 g of cinnamon. The other group received 60 capsules each contained 1 g of sugar powder (placebo). All the patients instructed to take one capsule twice daily for 1 month. National Institutes of Health-Chronic Prostatitis Symptom Index (NIH-CPSI) was reported for bot
... Show MoreThe melting duration in the photovoltaic/phase-change material (PV/PCM) system is a crucial parameter for thermal energy management such that its improvement can realize better energy management in respect to thermal storage capabilities, thermal conditions, and the lifespan of PV modules. An innovative and efficient technique for improving the melting duration is the inclusion of an exterior metal foam layer in the PV/PCM system. For detailed investigations of utilizing different metal foam configurations in terms of their convective heat transfer coefficients, the present paper proposes a newly developed mathematical model for the PV/PCM–metal foam assembly that can readily be implemented with a wide range of operating condition
... Show MoreIn this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe
... Show MoreThis study deals with free convection heat transfer for the outer surface of two
cylinders of the shape of (Triangular & Rectangular fined cylinders with 8-fins),
putted into two different spaces; small one with dimension of (Length=1.2m,
height=1m, width=0.9m) and large one with dimension of (Length=3.6m, height =3m,
width=2.7m). The experimental work was conducted with air as a heat transport
medium. These cylinders were fixed at different slope angles (0o, 30o, 60o and 90o)
.The heat fluxes were (279, 1012, 1958, 3005, 4419) W/m2, where heat transferred by
convection and radiation. In large space, the results show that the heat transfer from
the triangular finned cylinder is maximum at a slope angle equals
In this research prepared two composite materials , the first prepared from unsaturated polyester resin (UP) , which is a matrix , and aluminum oxide (Al2O3) , and the second prepared from unsaturated polyester resin and aluminum oxide and copper oxide (CuO) , the two composites materials (Alone and Hybrid) of percentage weight (5,10,15)% . All samples were prepared by hand layup process, and study the electrical and thermal conductivity. The results showed decrease electrical conductivity from (10 - 2.39) ×10-15 for (Up+ Al2O3) and from (10 - 2.06)×10-15 for (Up+ Al2O3+ CuO) .But increase thermal conductivity from( 0.17 - 0.505) for (Up+ Al2O3) and from (0.17 - 0.489) for (Up+ Al2O3+ CuO).
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show More