A mathematical model constructed to study the combined effects of the concentration and the thermodiffusion on the nanoparticles of a Jeffrey fluid with a magnetic field effect the process of containing waves in a three-dimensional rectangular porous medium canal. Using the HPM to solve the nonlinear and coupled partial differential equations. Numerical results were obtained for temperature distribution, nanoparticles concentration, velocity, pressure rise, pressure gradient, friction force and stream function. Through the graphs, it was found that the velocity of fluid rises with the increase of a mean rate of volume flow and a magnetic parameter, while the velocity goes down with the increasing a Darcy number and lateral walls. Also, the velocity behaves strangely under the influence of the Brownian motion parameter and local nanoparticle Grashof number effect.
Chlopheniramine maleate ( CPM ) , is one of the H- receptor antagonist , widely used in allergic diseases ,like skin rash and pruritis .CPM 3%w/w was successfully loaded in 2%w/w sodium alginate (SA) as a gel base , and to be considered as a selected formula .It was found that the diffusion of CPM through the skin of albino rat was increased as the concentration of CPM increased from 2 %w/w sodium alginate , More
... Show MoreOff-nucleus isotropic magnetic shielding (σiso(r)) and multi-points nucleus independent chemical shift (NICS(0-2 Å)) index were utilized to find the impacts of the isomerization of gas-phase furfuraldehyde (FD) on bonding and aromaticity of FD. Multidimensional (1D to 3D) grids of ghost atoms (bqs) were used as local magnetic probes to evaluate σiso(r) through gauge-including atomic orbitals (GIAO) at density functional theory (DFT) and B3LYP functional/6-311+G(d,p) basis set level of theory. 1D σiso(r) responses along each bond of FD were examined. Also, a σiso(r) 2D-scan was performed to obtain σiso(r) behavior at vertical heights of 0–1 Å above the FD plane in its cis, transition state (TS) and trans forms. New techniques fo
... Show MoreEvaluation of trace elements in Iraqi chewing gums are unavailable, particularly pollution of toxic elements, materials which change the values of PH in the Oral. Atomic Absorption Spectroscopy (AAS) were successfully employed to determine the concentration of 7 trace elements (essentially toxic and nonessential) and the PH, in thirteen different brands of chewing gum generally consumed in Iraq. Combined wet and dry digestion procedures were applied. Two types of heated graphite tubes were used, coated and uncoated tubes treated with tungsten solution. Result showed that Cu, Al and Zn were at very high levels in almost all brands whereas Mn was found to be high in brands A and O only.
Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More