The present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as temperature distribution for a selection of parameters sets
consisting of dimensionless heat generation parameter (0.0 ≤ Q ≤ 2.0), conduction – radiation parameter (0.0 ≤ N ≤ 10.0), and the dimensionless magneto hydrodynamic parameter (0.0 ≤ M ≤ 1.0). Numerical solution have been considered for a fluid Prandtl number fixed at (Pr=0.7), Rayleigh number (102 ≤ ≤ 105 ) l Ra . The results are shown reasonable representation to the relation between Nusselt number and Rayleigh number with other parameters (M, N and Q). Generally, Nu increase with increasing Ra, M, N and Q separately. When the MHD, N, and Q effect added to the heat transfer mechanism, the heat transfer rate increased and this effect increased with increasing in Ra, MHD, N, and Q. The effect of magneto hydrodynamic, heat generation and heat radiation on the rate of heat transfer is concluded by correlation
equations. The results are found to be in good agreement compared with the results of other researchers.
Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show MoreBackground: The aim of this national oral health survey was to determine the prevalence of malocclusions due to some anomalies in the dentition among the 13 years old Kurdish students in sulaimani intermediate school. Materials and methods: The total sample was 950 (455 males and 495 females) which assessed by diagnostic set and special instrument. The clinical examination was mainly based on the definitions of Björk et al. Some variables were recorded as present or absent sometimes denoting the tooth or the teeth involved in malocclusion and their distribution according to the whole sample. Results: The results showed that 1)The most common extracted tooth was the mandibular first molar (2.9%). 2) At this age group the most common partial
... Show MoreBackground and Objectives: Urinary tract infections (UTIs), among a wide range of microbial infections, are of a double-edged worry with health-care and economic implications. They are serious diseases that can influence various parts of the urinary tract. The aim of this study was characterization of the enteric bacteria isolated from urine of human UTIs and studying their antimicrobial sensitivity. Materials and methods: A total of 50 urine samples were collected from patients with UTIs of both genders. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was done against 10 antimicrobials. Results: Both genders of human were found to suffer from urinary tract problems
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More