This paper is employed to discuss the effects of the magnetic field and heat transfer on the peristaltic flow of Rabinowitsch fluid through a porous medium in the cilia channel. The governing equations (mass, motion, and energy) are formulated and then the assumptions of long wavelength and low Reynold number are used for simplification. The velocity field, pressure gradient, temperature, and streamlines are obtained when the perturbation technique is applied to solve the nonlinear partial differential equations. The study shows that the velocity is decreased with increasing Hartmann number while it is decreased with increasing the porosity.
Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreIn this research, aflatoxins were produced, extracted, isolated, and purified in order to optimize the storage conditions of feed. Using a preparative thin layer chromatography (TLC) method, with commercially available plates of 1.5 to 2.0 mm, B1 aflatoxin was isolated from the feed samples of whole wheat, maize, and crushed rice, and the procedure was repeated four times. A purity value of 99 % for B1 aflatoxin was achieved and tested using spectrophotometric and chromatographic methods. As solvents, acetone:water (85:15l) was used for aflatoxin extraction from the feed sample, whereas methanol: water (50: 50) was used for trichothecenes extraction. The primary findings of this research indicate that B1 aflatoxin reac
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreThe occupier’s civil liability in English law is considered as one of the main types of the responsibility imposed by the law of Torts. and is regarded as a special system of the civil liability arising from negligence, as well as two other systems, that is to say , the employer’s non-contractual liability and The liability from defective products. It is worth-bearing in mind that the common law has imposed on the occupier of the premises a duty of safety towards those who enter his premises. And two English legislations have been enacted later to regulate this type of liability legislatively, namely, the Occupier's liability Act 1957 and the Occupier's liability Act 1984. Whereas the Iraqi civil law No. 40 of 1951 has regulate
... Show MoreDiabetes mellitus type II is a disorder of metabolism and complex diseases affected by genetic environmental factors and associated with inflammation. The symptoms of type II diabetes develop gradually, which are associated with increased blood concentration of marker of the endothelial inflammatory factors. The expression of adhesion molecules, including E-selectin, intracellular adhesion molecule-1(ICAM-1) and vascular cell adhesion molecule-1 (VCAM-1) on the surface of vascular endothelial cells to help leukocyte stick to other surrounding tissues. Many researchers have made attempts to determine the significance of particular ABO phenotype for the susceptibility to diseases. Many reports show a strong association with the ABO blood grou
... Show MoreHypercholesterolemia is a predominant risk factor for atherosclerosis and cardiovascular disease (CVD). The World Health Organization (WHO), ) recommended reducing the intake of cholesterol and saturated fats. On the other hand, limited evidence is available on the benefits of vegetables in the diet to reduce these risk factors, so this research was conducted to compare the hypolipidemic effect between the extracts of two different types of Iraqi peppers, the fruit of the genus Capsicum traditionally known as red pepper extract (RPE), and Piper nigrum as black pepper extract (BPE), respectively, in different parameters and histology of the liver of the experimental animals. The red pepper was extracted by ethyl acetate, while the black pepp
... Show MoreType 2 diabetes mellitus (DM) is a group of metabolic disorder disease. The inflammatory markers act as a new risk factor for development of type 2 diabetes with a possible association with ABO/Rh blood groups. Human ABO genes are located on chromosome 9q34.1-q34.2. The aim of this study was to investigate the possible association between inflammatory markers, interleukin (IL) -18 and IL-33 in type 2DM and ABO blood groups. Sixty four patients with newly diagnosed type2 DM and control group consist of twenty healthy Iraqi individual. Laboratory test were include ABO blood groups using standard serological procedures and detection IL-18 and IL-33 in serum by ELISA kits. The Present data showed a significant increase i
... Show More