Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the platform showed its capabilities to register and log users, releasing a lot of information of lost items and automatically forwarding lost-and-found notifications. The paper can be useful for those who deal with the application of information technology.
The nuclear shell model was used to investigate the bulk properties of lithium isotopes (6,7,8,9,11Li), i.e., the ground state density distributions and C0 and C2 components of charge form factors. The theoretical treatment was based on supposing that the Harmonic-oscillator (HO) potential governs the core nucleons while the valence nucleon(s) move through Hulthen potential. Such assumptions were applied for both stable and exotic lithium isotopes. The HO size parameters ( and ), the core radii ( ) and the attenuation parameters ( and ) were fixed to recreate the available empirical size radii for lithium isotopes under study.
A Al-Nuaimy, B Fadheel…, IPMJ, 2009 - Cited by 1
AN Adil A, F Basman M, 2009
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAdvanced drug delivery systems offer undeniable benefits for drug delivery. In the past three decades, new methods have been proposed to develop a novel carriers for drug delivery. Nowadays, the major goal is to maximize therapeutic benefit while minimizing side effects. Drug delivery technique is clearly shifting from the micro to nanoscale. Nano-drug delivery systems (NDDSs) are the most promising approach utilized to improve the accuracy of drug delivery and the efficacy of drugs.In this narrative review article, we evaluate how delivery challenges associated with commercial marketed products and discuss newer DDS is being carried out to overcome these challenges .Different colloidal carrier systems such as carbon nanotube ,li
... Show MoreThis paper presents the design, construction and investigates an experimental study of a parabolic Trough Solar Collector (PTSC). It is constructed of multi – piece glass mirror to form the parabolic reflector (1.8 m ? 2.8 m) its form were checked with help of a laser and carbon steel rectangular as receiver. Sun tracker has been developed (using two – axis) to track solar PTSC according to the direction of beam propagation of solar radiation. Using synthetic oil as a heat transfer its capability to heat transfer and load high temperature (?400 oc). The storage tank is fabricated with stainless steel of size 50 L. The experimental tests have been carried out in Baghdad climatic conditions (33.3o N, 44.4o E) during selective days of the
... Show MoreBackground: Tumor-like overgrowth lesions of the oral mucosa are pathological growths that project above the normal contour of the oral surface. A practical classification can be made according to the site of origin, the etiology and the histological appearance. The aim of this article is to evaluate and analyze patients with gingival and alveolar ridge tumor-like overgrowth lesions in terms of surgical treatment, diagnosis and outcome. Materials and Methods: Patients complaining of these lesions were treated by surgical excision under local or general anesthesia; the excised lesions were submitted for histopathological examination, during the follow up period the patients were examined for complications and recurrence. Results: Pyogenic gr
... Show More