This article deals with the impact of including transverse ribs within the absorber tube of the concentrated linear Fresnel collector (CLFRC) system with a secondary compound parabolic collector (CPC) on thermal and flow performance coefficients. The enhancement rates of heat transfer due to varying governing parameters were compared and analyzed parametrically at Reynolds numbers in the range 5,000–13,000, employing water as the heat transfer fluid. Simulations were performed to solve the governing equations using the finite volume method (FVM) under various boundary conditions. For all Reynolds numbers, the average Nusselt number in the circular tube in the CLFRC system with ribs was found to be larger than that of the plain absorber tube. Also, the inclusion of transverse ribs inside the absorber tube increases the average Nusselt number by approximately 115% at Re = 5,000 and 175% at Re = 13,000. For all Reynolds numbers, the skin friction coefficient of the circular tube with ribs in the CLFRC system is larger than that of the plain absorber tube. The coefficient of surface friction reduces as the Reynolds number increases. The performance assessment criterion was found to vary between 1.8 and 1.9 as the Reynolds number increases.
In this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with compar
... Show MoreBackground: The rapid integration of Artificial Intelligence (AI) into healthcare necessitates that nursing education evolves to equip students with essential technological competencies. Objectives: To explore pediatric nursing students' perceptions of AI in nursing and analyze associations with sociodemographic factors and prior AI knowledge. Methods: A descriptive cross-sectional study was conducted from December 2024 to March 2025 across five universities in Baghdad. A non-probability sample of 500 pediatric nursing students completed the Shinners Artificial Intelligence Perception (SAIP) tool. Data were analyzed using descriptive statistics and inferential comparisons (t-tests/ANOVA) via SPSS. Results: Participants had a mean ag
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreCollapsible soil has a metastable structure that experiences a large reduction in volume or collapse when wetting. The characteristics of collapsible soil contribute to different problems for infrastructures constructed on its such as cracks and excessive settlement found in buildings, railways channels, bridges, and roads. This paper aims to provide an art review on collapse soil behavior all over the world, type of collapse soil, identification of collapse potential, and factors that affect collapsibility soil. As urban grow in several parts of the world, the collapsible soil will have more get to the water. As a result, there will be an increase in the number of wetting collapse problems, so it's very important to com
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More