The prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreThis research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the company's relian
... Show MoreSocial Aspects in the Kingdom of Mali Through Ibn Battuta's book Tuhfat Alnuddar in Garaeb Al Amsar Wa Ajaeb Al Asfar
In this study, the physical, and mechanical properties of low-cost and biocomposites were evaluated. The walnut shell and date palm frond fibers were thermally treated in an oven at a temperature of 70°C and then chemically treated with NaOH and distilled water solution, after these treatments, the biocomposite materials will be thermally treated again at 50°C. This procedure was performed for three types of biocomposite; Walnut shell Fiber Reinforced Polymer (WFRP), Date palm Fiber Reinforced Polymer (DFRP), and Hybrid Fiber Reinforced Polymer (HFRP), whereas the biocomposite sheets consisting of 30% biofibers and 70% unsaturated polyester, the mechanical test specimens were cut by a CNC machine according to ASTM standards. The e
... Show MoreIn the present study, composites were prepared by Hand lay-up molding and investigated. The composites constituents were epoxy resin as the matrix, 6% volume fractions of Glass Fibers (G.F) as reinforcement and 3%, 6% of industrial powder (Calcium Carbonate CaCO3, Potassium Carbonate K2CO3 and Sodium Carbonate Na2CO3) as filler. Density, water absorption, hardness test, flexural strength, shear stress measurements and tests were conducted to reveal their values for each type of composite material. The results showed that the non – reinforced epoxy have lower properties than composites material. Measured density results had show an incremental increase with volume fraction increase
... Show MoreThis paper focused on the stone matrix asphalt (SMA) technology that was developed essentially to guard against rutting distress. For this procedure, fibers play a racy role in stabilizing and preventing the drain down problem caused by the necessity of high binder content coupled with their strengthening effect. A set of specimens with cylindrical and slab shapes were fabricated by inclusions jute, polyester, and carbon fibers. For each type, three contents of 0.25%, 0.5%, and 0.75% by weight of mixture were added by lengths of 5, 7.5, and 10 mm. The prepared mixtures were tested to gain the essential pertained parameters discriminated by the values of drain down, Marshall quotient, rut depth, and dynamic stability. It
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.