Numerical Investigation was done for steady state laminar mixed convection and thermally and hydrodynamic fully developed flow through horizontal rectangular duct including circular core with two cases of time periodic boundary condition, first case on the rectangular wall while keeping core wall constant and other on both the rectangular duct and core walls. The used governing equations are continuity momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C.) methods. The Finite Difference approach with the Line Successive Over Relaxation (LSOR) method is used to obtain all the computational results the (B.F.C.) method is used to generate the grid of the problem. A computer program (Fortan 90) is built to calculate Nusselt Number (Nu) in steady state. The fluid Prandtl number is 0.7 Rayleigh Number 1<Ra<106, Reynolds number 1<Re<2000. For the range of parameters considered, results show that the time periodic boundary condition enhance heat transfer. It is also indicated in the results that heat transfer from the surface of the circle exceeds that of the rectangle duct. Comparisons with other research show good agreement.
Background: Dolutegravir sodium (DTG), used to treat HIV, faces challenges in delivering effective therapeutic concentrations to the brain due to the blood-brain barrier (BBB). Nanostructured lipid carriers (NLCs) combined with in situ gels present a promising strategy for enhancing brain drug delivery via the intranasal route. Objective: To compare brain pharmacokinetics of DTGs delivered via NLC-loaded in situ gel intranasal administration with the conventional intravenous (IV) drug solution. Methods: 80 Wistar rats, which were divided into three groups: two groups consisting of 39 animals each and a control group with 2 animals. Rats were administered with a dose of 1.0 mg/kg of DTGs IV, and DTGs NLC-loaded in situ gel were admin
... Show MoreIntroduction/Aim. Seminal fluid analysis (SFA) plays a crucial role in helping infertility clinics diagnose the underlying reason of male infertility. The aim of the study was to investigate seminal fluid patterns of male partners of an infertile couple with apparently fertile female partners. Materials and methods. A cross-sectional study was conducted between January 2019 and December 2022. Patients were attending consultations for delayed conception for more than 12 months with apparently fertile female partner. Results. Four hundred fifty-three patients were included in the study. The distribution of patients according to age groups showed that 277 patients were young, aged 21 - 30 years (61%). Two hundred sixty-two (58%) patien
... Show MoreIn this study, tin oxide (SnO2) and mixed with cadmium oxide (CdO) with concentration ratio of (5, 10, 15, 20)% films were deposited by spray pyrolysis technique onto glass substrates at 300ºC temperature. The structure of the SnO2:CdO mixed films have polycrystalline structure with (110) and (101) preferential orientations. Atomic force microscopy (AFM) show the films are displayed granular structure. It was found that the grain size increases with increasing of mixed concentration ratio. The transmittance in visible and NIR region was estimated for SnO2:CdO mixed films. Direct optical band gap was estimated for SnO2 and SnO2 mixed CdO and show a decrease in the energy gap with increasing mixing ratio. From Hall measurement, it was fou
... Show MoreMaintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show More