CFD analysis on optimizing the annular fin parameters toward an improved storage response in a triple‐tube containment system
...Show More Authors
The study aimed to prepare quick response codes to learn some of the technical skills of the second graders in the Faculty of Physical Education and Sports Sciences. The experimental method was used in the design of the experimental and control experimental and control groups. The research sample was represented by second-graders in the College of Physical Education and Sports Sciences / University of Baghdad, and by lot, the second division (a) was chosen to represent the experimental group that applied the inverse method using the QR code, and the second division (g) to represent the control group and applied the traditional method. (10) Students per group. After the tribal tests, his main experiment was carried out for 10 weeks with one
... Show MoreThe study aimed to prepare quick response codes to learn some of the technical skills of the second graders in the Faculty of Physical Education and Sports Sciences. The experimental method was used in the design of the experimental and control experimental and control groups. The research sample was represented by second-graders in the College of Physical Education and Sports Sciences / University of Baghdad, and by lot, the second division (a) was chosen to represent the experimental group that applied the inverse method using the QR code, and the second division (g) to represent the control group and applied the traditional method. (10) Students per group. After the tribal tests, his main experiment was carried out for 10 weeks with one
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe subject of demand on oil derivative has occupied an important position at present time in the daily life context. The fuel of benzene and gas oil and kerosene is one of basic elements of that concern, and on local , regional and international levels. The oil derivatives have played a leading role in determining the course and nature of development since early 1970 to the present time whether in the productive Arab countries or the importing. The researcher set out from the hypothesis that the increase of the local consumer demand on some of the oil derivatives is because of the internal and external factors accompanied by the inability of the productive capability and local production to confront this increase, and the resort
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreMental disorders (MDs) are a common problem in Primary Health Care Centers (PHCCs). Many people with serious MDs are challenged by symptoms and disabilities that result from the disease and by stereotypes and prejudice due to misconceptions about mental illness. This study aims at evaluating the knowledge, and attitude toward mental health concepts and services and causes of the reluctance to seek those services among people attending PHCCs. A descriptive cross-sectional study was conducted. The random sampling technique was used to include (10) of Directorates of Health (DoHs) coverage north, middle, and south of Iraq. The study was executed in (50) selected PHCs, (5) PHCCs in each DoH involved randomly selected (30) people attending th
... Show MoreDirect agglutination test was used to evaluate the immunogenicity of three different antigens inoculated in hamsters as one , two and three doses which were: Group (1) inoculated with autoclaved killed Leishmania tropica , Group (2) inoculated with BCG vaccine alone while Group (3) inoculated with mixed antigens (autoclaved killed Leishmania "AKL"+ BCG).(4) Control animals inoculated with phosphate buffer saline. The maximum level of antibody titers were evaluated in animal inoculated with one , two or three dose of mixed antigens (320 , 640 and 1280) respectively when it compared with animals inoculated with corresponding doses of AKL antigen (80 , 160 and 320) respectively. While the minimum level of antibody titers were observed in ani
... Show More