Experimental measurements of viscosity and thermal conductivity of single layer of graphene . based DI-water nanofluid are performed as a function of concentrations (0.1-1wt%) and temperatures between (5 to 35ºC). The result reveals that the thermal conductivity of GNPs nanofluids was increased with increasing the nanoparticle weight fraction concentration and temperature, while the maximum enhancement was about 22% for concentration of 1 wt.% at
35ºC. These experimental results were compared with some theoretical models and a good agreement between Nan’s model and the experimental results was observed. The viscosity of the graphene nanofluid displays Newtonian and Non-Newtonian behaviors with respect to nanoparticles concentration and temperature, and about 111% enhancement was obtained compared to the base fluid with GNPs weight fraction concentration of 1wt.% at 35ºC. Based on
the experimental data, correlations were developed for predicting thermophysical properties of the GNPs based DI-water nanofluid.
This study designed to prepare ultrafine apixaban (APX) o/w nanoemulsion (NE) based gel with droplet size below 50 nm as a good method for transdermal APX delivery without using permeation enhancer, alternatively, the formulation components itself act as permeation enhancer. APX, a potent oral anticoagulant drug that selectively and directly inhibit coagulation factor Xa, was selected as a good candidate for transdermal delivery as it displays poor water solubility (0.028 mg/mL) and low bioavailability (50%). APX-NE gel was prepared using triacetin, triton-x-100 and carbitol as oil phase, surfactant and cosurfactant respectively, while Carbopol 940 used as a gelling agent. Ex vivo permeation of APX-NE gel through human stratum c
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreKE Sharquie, AA Noaimi, BAM Saleh, 2015
KE Sharquie, AA Al-Nuaimy, WJ Kadhum, Saudi medical journal, 2006 - Cited by 3
This study aimed to study the effect of Ziziphus spina christi Aqueous cold and Alcoholic leaves and fruits extracts on the growth and activities of the following types of bacteria :( Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Streptococcus pyogenes ). The results appeared outweigh the alcoholic extract of leaves and fruits of Sidr that prepared by saxholate extractor by addition of ethanol 95% significant superiority as compared with aqueous extract that prepared by using distilled water as was its influence inhibitor to the growth and effectiveness of bacteria , about the treatment of in-vivo to cause injury to these types of bacteria diagnosed laboratory mice and treated with alcoholic extract of the leaves o
... Show MoreThe aim of this work is to study the influence of the type of fiber glass –mat on fatigue behavior of composite material which is manufactured from polyester and E-glass (woven roving, chopped strand mat (CSM)) as a laminate with a constant fiber volume fraction (VF) of 33%. The results showed that the laminates reinforced with E-glass (woven roving) [0/90, ±45.0/90] and [0/90, CSM, 0/90] have lower fatigue strength than the laminates reinforced with E-glass [0/90]3,[CSM]3 and [CSM, 0/90, CSM] although they had different tensile strength; the best laminate was [0/90]3 .
Shoulder immobilization is one of the injuries that lead to disability and loss of movement in the joint within a short time, which called the researchers to find appropriate therapeutic means to rehabilitate this injury. They prepared a rehabilitation program accompanying the reflexology technique to rehabilitate the injury of the immobilized shoulder of the small degree and improve the range of movement and muscle strength working on the shoulder joint The sample was selected from the male patients aged (40-50) years. The muscle strength test was used using the force sensor, the shoulder range test from the flexion and extension position and the visual analog test to measure the level of pain. The study concluded that the pre-rehabilitati
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More