In this article, the nonlinear problem of Jeffery-Hamel flow has been solved analytically and numerically by using reliable iterative and numerical methods. The approximate solutions obtained by using the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM). The obtained solutions are discussed numerically, in comparison with other numerical solutions obtained from the fourth order Runge-Kutta (RK4), Euler and previous analytic methods available in literature. In addition, the convergence of the proposed methods is given based on the Banach fixed point theorem. The results reveal that the presented methods are reliable, effective and applicable to solve other nonlinear problems. Our computational works have been done by using the computer algebra system MATHEMATICA®10 to evaluate the terms in the iterative processes.
In this study Microwave and conventional methods have been used to extract and estimate pectin and its degree of esterification from dried grapefruit and orange peels. Acidified solution water with nitric acid in pH (1.5) was used. In conventional method, different temperature degrees for extraction pectin from grape fruit and orange(85 ,90 , 95 and 100?C) for 1 h were used The results showed grapefruit peels contained 12.82, 17.05, 18.47, 15.89% respectively, while the corresponding values were 5.96, 6.74, 7.41 and 8.00 %, respectively in orange peels. In microwave method, times were 90, 100, 110 and 120 seconds. Grapefruit peels contain 13.86, 16.57, 18.69, and 17.87%, respectively, while the corresponding values were of 6.53, 6.68, 7.2
... Show MoreIf the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i
... Show MoreNew, simple and sensitive batch and Flow-injecton spectrophotometric methods for the determination of Thymol in pure form and in mouth wash preparations have been proposed in this study. These methods were based on a diazotization and coupling reaction between Thymol and diazotized procaine HCl in alkaline medium to form an intense orange-red water-soluble dye that is stable and has a maximum absorption at 474 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 0.4-4.8 and 4-80 µg.ml-1 of Thymol, with detection limits of 0.072 and 1.807 µg.ml-1 of Thymol for batch and FIA methods respectively. The FIA procedure sample throughput was 80 h-1. All different chemical and physical e
... Show MoreThis research study experimentally the effect of air flow rate on humidification process
parameters. Experimental data are obtained from air conditioning study unit T110D. Results obtained
from experimental test, calculations and psychometrics software are discussed. The effect of air flow rate
on steam humidification process parameters as a part of air-conditioning processes can be explained
according to obtained results. Results of the steam humidification processes (1,2) with and without
preheating with 5A and 7.5A shows decreasing in dry bulb temperature, humidity ratio, and heat add to
moist air with increasing air flow rate, but humidification load, and total energy of moist air increase with
increasing air flo
This semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca
... Show MoreThe process of accurate localization of the basic components of human faces (i.e., eyebrows, eyes, nose, mouth, etc.) from images is an important step in face processing techniques like face tracking, facial expression recognition or face recognition. However, it is a challenging task due to the variations in scale, orientation, pose, facial expressions, partial occlusions and lighting conditions. In the current paper, a scheme includes the method of three-hierarchal stages for facial components extraction is presented; it works regardless of illumination variance. Adaptive linear contrast enhancement methods like gamma correction and contrast stretching are used to simulate the variance in light condition among images. As testing material
... Show MoreRapid development has achieved in treating tumor to stop malignant cell growth and metastasis in the past decade. Numerous researches have emerged to increase potency and efficacy with novel methods for drug delivery. The main objective of this literature review was to illustrate the impact of current new targeting methods to other previous delivering systems to select the most appropriate method in cancer therapy. This review first gave a brief summary of cancer structure and highlighted the main roles of targeting systems. Different types of delivering systems have been addressed in this literature review with focusing on the latest carrier derived from malarial protein. The remarkable advantages and main limitations of the later
... Show MoreThe study focuses on assessment of the quality of some image enhancement methods which were implemented on renal X-ray images. The enhancement methods included Imadjust, Histogram Equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE). The images qualities were calculated to compare input images with output images from these three enhancement techniques. An eight renal x-ray images are collected to perform these methods. Generally, the x-ray images are lack of contrast and low in radiation dosage. This lack of image quality can be amended by enhancement process. Three quality image factors were done to assess the resulted images involved (Naturalness Image Quality Evaluator (NIQE), Perception based Image Qual
... Show MoreThe condition of Islam and Muslims and what their political, social, cultural and educational status, and even religious and faith status, has led to whoever feels his belonging to this great religion and that middle nation, to try as much as he can to fix what has been corrupted as much as he can, and perhaps in diagnosing illness and illness as It was said half the way to treatment, and from this standpoint I liked to occupy thought, work consideration and harness part of the youth’s life in order to reach what contributes to reforming the situation and the safety of generations, and this is only in seeking knowledge and learning it by following the guidance of the Messenger (r) and his companions ( y) Therefore, the subject of my re
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More