Increasing requests for modified and personalized pharmaceutics and medical materials makes the implementation of additive manufacturing increased rapidly in recent years. 3D printing has been involved numerous advantages in case of reduction in waste, flexibility in the design, and minimizing the high cost of intended products for bulk production of. Several of 3D printing technologies have been developed to fabricate novel solid dosage forms, including selective laser sintering, binder deposition, stereolithography, inkjet printing, extrusion-based printing, and fused deposition modeling. The selection of 3D printing techniques depends on their compatibility with the printed drug products. This review intent to provide a perspecti
... Show MoreE-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe highest incidence of injury is seen in adolescent playing pivoting sports such as soccer, basketball, and handball. Objective: To examine the effectiveness of a neuromuscular prevention program in reducing knee and ankle injuries in adolescent male soccer players.
Abstract: The international community now places significant emphasis on achieving zero carbon emissions, requiring both new researchers and experienced policymakers to prioritise this goal. This article examines the effects of carbon taxes, carbon cap and trade, renewable energy (RE) production and consumption, and economic growth (EG) on carbon emission reduction in the United States, Japan, Canada, and Australia. The study collected secondary data from the World Development Indicators (WDI) secondary source spanning the years 1991 to 2022. The study examines the relationship between variables using the cross-sectionally augmented autoregressive distributed lag (CS-ARDL) approach. The findings indicate that carbon taxes, carbon cap and tr
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreRecently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show More