In this paper, we study the impacts of variable viscosity , heat and mass transfer on magneto hydrodynamic (MHD) peristaltic flow in a asymmetric tapered inclined channel with porous medium . The viscosity is considered as a function of temperature. The slip conditions at the walls were taken into consideration. Small
Reynolds number and the long wavelength approximations were used to simplify the governing equations. A comparison between the two velocities in cases of slip and no-slip was plotted. It was observed that the behavior of the velocity differed in the two applied models for some parameters. Mathematica software was used to estimate the exact solutions of temperature and concentration profiles. The resolution of the equations to the momentum was based on the perturbation method to find the axial velocity, pressure gradient and trapping phenomenon. The influences of the various flow parameters of the problem on these distributions were debated and proved graphically by figures.
This study was conducted on the effect of the sedimentary source (the sediments coming from both the Iraqi-Iranian borderline and the Tigris river) on the optical and textural features, especially sphericity and roundness of feldspar minerals (potassium and plagioclase types) in soils of the southern part of the alluvial plain. Eight pedons were selected to represent the study area, five of them represented sediments coming from the borderline, which included pedons of (Badra, Taj Al-Din, Al-Shihabi, Jassan, and Galati), while two of them represent the sediments of the Tigris River (Essaouira, Al-Dabouni), the pedon of Ali Al-Gharbi was represented the mixing area of sediments of all the floods coming from the borderline and the sediments o
... Show MoreThe electronic payment systems are considered the most important infrastructure for the work of banks, particularly after a steady and remarkable development in information and communication technology, Which created the reality of the work of the infrastructure for these systems and these systems also become one of the most important components of infrastructure for the work of banks, cause it is one of the most important channels through which the transfer of cash, financial instruments between financial institutions in general and banking in particular.
In order to achieve the objectives of the research, the most important to identify the concept of electronic payment systems, and its divisions, and th
... Show MoreThe locations of the Moon, velocity and distance were determined through hundred years using a modified formula Meeus 1998, which is used to calculate the orbit's elements, Additionally which allows us to specify the possible date for monitoring the crescent moon. In this project we describe the orbits, orbit types and orbital elements than describe the orbit of the Moon and the perturbations effect on shape and direction of the Moon's orbit, the orbital elements effect by the all perturbation were calculated directly using empirical formula. The orbital elements of the Moon's orbit for 1326 anomalies months are calculated by our Q. Basic programs and the time variation of the Moon's orbital element with perturbations can be computed by
... Show MoreJurisprudential rulings were not once restricted to anyone. Even if some prominent imams were famous in one science, this does not mean that some of them were not very knowledgeable and well versed in another science, but he did not know much about it, given his fame in the first science in which he emerged. It prevailed over him until he became known only through him, and there are a large number of these people, and among them is our imam, the great critic Yahya bin Ma’in, may God be pleased with him. Many people, and even scholars, know about him except that he is the only imam in jarh and ta’deel, and on his words and the words of his strike are relied upon. In terms of the authenticity and weakness of the hadith, he is in this f
... Show MoreToday’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin
... Show MoreThe need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreBackground: Using dual-energy X-ray absorptiometry, body fat mass has been determined. The assessment of body fat mass was conducted utilizing dual-energy X-ray absorptiometry analysis of the pelvis and vertebral column. While it is acknowledged that osteoporosis can impact both body fat mass and bone mineral density, the particulars of this relationship currently remain uncertain. Objective: The aim of the present investigation is to assess gender differences in the effects of osteoporosis on the body fat mass of the upper and lower extremities. Method: 170 individuals participated (85 males and 85 females) in this study. Patients who presented with bone discomfort consisted of 40 males and 40 females. In addition, 90 apparently he
... Show MoreThe inhibition ability of the new derivative (quinolin-2-one), namely (1-{[5-(2-Chloro-phenylazo)-2- hydroy-benzylidene]-amino}-4,7-dimethyl -6-nitro- 1H-quinolin-2-one (CPHAQ2O)) towards carbon steel corrosion in (3.5% NaCl) and (0.5M HCl) solutions were evaluated by potentiodynamic polarization at different inhibitor concentrations. Polarization curves showed that the evaluated compound acted as mixed inhibitors, and the adsorption of the evaluated inhibitor obeys the Langmuir adsorption isotherm in both salt and acid solutions. The results revealed that the percentage inhibition efficiency (%IE) in the salty solution (90.55%) is greater than that in the acidic solution (77.62%). The surface changes of the carbon steel and the film per
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More