A mathematical model constructed to study the combined effects of the concentration and the thermodiffusion on the nanoparticles of a Jeffrey fluid with a magnetic field effect the process of containing waves in a three-dimensional rectangular porous medium canal. Using the HPM to solve the nonlinear and coupled partial differential equations. Numerical results were obtained for temperature distribution, nanoparticles concentration, velocity, pressure rise, pressure gradient, friction force and stream function. Through the graphs, it was found that the velocity of fluid rises with the increase of a mean rate of volume flow and a magnetic parameter, while the velocity goes down with the increasing a Darcy number and lateral walls. Also, the velocity behaves strangely under the influence of the Brownian motion parameter and local nanoparticle Grashof number effect.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The current study aimed to identify the difficulties faced by the student in mathematics and possible proposals to address these difficulties. The study used a descriptive method also used the questionnaire to collect data and information were applied to a sample of (163) male and female teachers. The results of the study found that the degree of difficulties in learning mathematics for the fifth and sixth grades is high for some paragraphs and intermediate for other paragraphs, included the student's field. The results also revealed that there were no statistically significant differences at the level of significance (α = 0.05) between the responses of the members of the study sample from male and female teachers to the degree of diffi
... Show MoreThe paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreThe research aims to determine optimal urban planning and design indicators of the urban clusters form in hot arid zones through studying of three urban areas in Baghdad, analyzing their urban indicators which include floor area ratio (FAR), urban clusters height, building density or land coverage, green areas, paved areas, shading ratio and how they affect urban temperature. The research reached the conclusion that air outdoor temperature on urban areas affected primarily by shadows casted on the ground, the effect of shaded area equals (5) times the effect of paved areas and (3.7) times the effect of green areas, this means that increasing urban clusters height in hot arid zones could minimize air outdoor temperature, building
... Show MoreBackground: Secretory Immunoglobulin A (SIgA) is a subclass of Immunoglobulin A (IgA), It is an antibody that plays an important role in mucosal immunity. It is the main immunoglobulin found in mucous secretions from mammary glands, tear glands and salivary glands, every pathologic process in the body involves the immune system, and periodontal inflammation is one of them and is not an exception. Material and methods: this study was consisted of 60 healthy male participants of an age ranged between (35-50) years old ; 25 of them with generalized moderate chronic periodontists(Clinical Attachment Loss equal to 3-4mm at ≥ 30% of the sites; 20 participants with plaque induced gingivitis and 15 participants had clinically healthy pe
... Show More