The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
This paper is employed to discuss the effects of the magnetic field and heat transfer on the peristaltic flow of Rabinowitsch fluid through a porous medium in the cilia channel. The governing equations (mass, motion, and energy) are formulated and then the assumptions of long wavelength and low Reynold number are used for simplification. The velocity field, pressure gradient, temperature, and streamlines are obtained when the perturbation technique is applied to solve the nonlinear partial differential equations. The study shows that the velocity is decreased with increasing Hartmann number while it is decreased with increasing the porosity.
Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreIn this research, aflatoxins were produced, extracted, isolated, and purified in order to optimize the storage conditions of feed. Using a preparative thin layer chromatography (TLC) method, with commercially available plates of 1.5 to 2.0 mm, B1 aflatoxin was isolated from the feed samples of whole wheat, maize, and crushed rice, and the procedure was repeated four times. A purity value of 99 % for B1 aflatoxin was achieved and tested using spectrophotometric and chromatographic methods. As solvents, acetone:water (85:15l) was used for aflatoxin extraction from the feed sample, whereas methanol: water (50: 50) was used for trichothecenes extraction. The primary findings of this research indicate that B1 aflatoxin reac
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreAlgae are photosynthetic microorganisms that play important role in aquatic ecosystems as they are the primary producers in aquatic food webs. Several groups of algae are capable of producing toxins that impact aquatic ecosystems, especially managed systems. Cyanobacteria are the most important algae in freshwaters, and many species produce cyanotoxins including hepatotoxins and neurotoxins. The potent cyano-neurotoxins β-N-methylamino-L-alanine (BMAA), 2, 4-diaminobutyric acid dihydrochloride (DABA), and anatoxin-a are especially critical with regards to public and animal health problems.
Abstract Background Infections with helminths are associated with deficient sanitary facilities, unsafe human waste disposal, inadequate and lack of safe drinking water, and low socioeconomic status. Objective To determine the prevalence of some gastrointestinal helminths among Iraqi people, and association of infections with age, sex, and region in Iraq. Method This study is retrospective, including reported cases of infections using an available surveillance database from January 2013 to December 2013 of all provinces of Iraq by the Ministry of Health. Result The overall prevalence of gastrointestinal helminthiasis was 1.39%. Enterobius vermicularis found to be the predominant helminth parasite. No significant (P < 0.05) rel
... Show More