A mathematical model constructed to study the combined effects of the concentration and the thermodiffusion on the nanoparticles of a Jeffrey fluid with a magnetic field effect the process of containing waves in a three-dimensional rectangular porous medium canal. Using the HPM to solve the nonlinear and coupled partial differential equations. Numerical results were obtained for temperature distribution, nanoparticles concentration, velocity, pressure rise, pressure gradient, friction force and stream function. Through the graphs, it was found that the velocity of fluid rises with the increase of a mean rate of volume flow and a magnetic parameter, while the velocity goes down with the increasing a Darcy number and lateral walls. Also, the velocity behaves strangely under the influence of the Brownian motion parameter and local nanoparticle Grashof number effect.
Writing in English is one of the essential factors for successful EFL learning .Iraqi students at the preparatory schools encounter problems when using their background knowledge in handling subskills of writing(Burhan,2013:164).Therefore, this study aims to investigate the 4thyear preparatory school students’ problems in English composition writing, and find solutions to these pro
... Show MoreThe paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme
... Show MoreAbstract in English The aim of this study is to identify the effectiveness of rehabilitation exercises in conjunction with aquatic therapy for those suffering from sacroiliitis in football players. The researcher used the experimental approach, using the experimental design (pre-measurement, post-measurement). Similar to the objectives and procedures of the research, the researcher assumed the following: the existence of significant differences. Statistics between pre- and post-measurements in variables in favor of post-measurement for the following variables (degree of pain and level of balance). The experimental approach was used with a pre- and post-measurement design on one group of football players with sacroiliitis, nu
... Show MoreBackground: Vitamin D improves innate immunity by enhancing the expression of antimicrobial peptides. The antimicrobial action of cathelicidin is widespread and effective against cariogenic bacteria. This research aimed to investigate the effect of vitamin D deficiency on the level of salivary cathelicidin concerning dental caries experience.
Subjects and Methods: A case-control study was carried out, and the sample was composed of 80 females; the study group involved 40 females with a serum vitamin D concentration of less than 10 ng/ml. In addition to the control group involving 40 females wh
... Show MoreThe current study includes 144 samples were 106 bacterial samples belonging to the clinical sources, 38 bacterial samples belonging to the environmental sources to investigate the presence of bacteria P. aeruginosa. The results of diagnosis clarified that there are 45 bacterial isolates belonging to the bacterium P. aeruginosa The examination of the sensitivity of all bacterial isolates was done for elected 45 isolation towards the 11 antibiotic by spread method on the dishes. The results showed that the resistance ratio toward Cefixim, Cefotaxim, Tetracycline, Amoxicillin, Cloxacillin, Methicillin, Erythromycin and Naldixic acid was 77.7, 73.3, 84.4, 82.2, 80, 77.7, 77.7 and 73.3 respectively, While most isolates were sensitive to all o
... Show MoreThe electrical properties of CdO/porous Si/c-Si heterojunction prepared by deposition of CdO layer on porous silicon synthesized by electrochemical etching were studied. The structural, optical, and electrical properties of CdO (50:50) thin film prepared by rapid thermal oxidation were examined. X-ray diffraction (XRD) results confirmed formation of nanostructured silicon layer the full width half maximum (FWHM) was increased after etching. The dark J-V characteristics of the heterojunction showed strong dependence on etching current density and etching time. The ideality factor and saturation current of the heterojunction were calculated from J-V under forward bias. C-V measurements confirmed that the prepared heterojunctions are abrupt
... Show MoreTool wear is a major problem in machining operations because the resulting material loss gradually changes of the machine tool. There many factors may leads to material loss like; friction, corrosion, and also it’s happened by rubbing during machining processes between the work piece and the tool. Dimensional accuracy of the work piece, and also the surface finish will be reducing by tool wear. It can also increase cutting force. In this study, we focused on the effect of the coating process on crater wear problems. Crater wear is caused by the flow between the chip and the rake face of the tool, whereas flank wear is caused by the contact between the tool and the work piece. In reducing crater wear, aluminum titanium nitride (AlTiN) u
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More