The present study analyzes the effect of couple stress fluid (CSF) with the activity of connected inclined magnetic field (IMF) of a non-uniform channel (NUC) through a porous medium (PM), taking into account the sliding speed effect on channel walls and the effect of nonlinear particle size, applying long wavelength and low Reynolds count estimates. The mathematical expressions of axial velocity, stream function, mechanical effect and increase in pressure have been analytically determined. The effect of the physical parameter is included in the present model in the computational results. The results of this algorithm have been presented in chart form by applying the mathematical program.
Transition metal complexes of Co(II) and Ni(II) with azo dye 3,5-dimethyl-2-(4-nitrophenylazo)-phenol derived from 4-nitoaniline and3,5-dimethylphenol were synthesized. Characterization of these compounds has been done on the basis of elemental analysis,electronic data, FT-IR,UV-Vis and 1 HNMR, as well as magnetic susceptibility and conductivity measurements. The nature of thecomplexes formed were studies following the mole ratio and continuous variation methods, Beer ' s law obeyed over a concentrationrange (1x10 -4 - 3x10 -4 M). High molar absorbtivity of the complex solutions were observed. From the analytical data, thestoichiomerty of the complexes has been found to be 1:2 (Metal:ligand). On the basis of physicochemical data tetrahedral
... Show MoreThis study was carried out at University of Baghdad - College of Agricultural Engineering Sciences - Research Station B during the autumn season 2019-2020, in order to evaluate the effect of Ozone and the foliar application of coconut water and moringa extract on the growth of broccoli plant grown in modified NFT film technology. A factorial experiment (2*5) was carried out within Nested Design with three replicates. The ozone treatment was distributed into the main plots which consisted of oxygen (O2) and ozone (O3). The foliar application of organic nutrients were distributed randomly within each replicate including five treatments, which were the control treatment (T0), Coconut water with two concentrations of 50 (T1) and 100 ml.
... Show MoreBackground: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .