One of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system without going into the system design by steps or what are the main part of this system and how can be implemented, tested, and developed individually. In this design, a DC motor produces, through a hydraulic piston, a flow pulse to the left ventricle chamber model, which is linked with two interchangeable prosthetic heart valves. The computer is used to control and process data from volumetric flow rate and image. The findings show that the linear displacement, the velocity of the piston and the linear acceleration regularly become significant particularly and follows a sinusoidal wave shape during one cycle, when (crank length/connecting rod length) value is equal 0.2 or less. Several sets of measured flow rate readings were obtained by using flow meter sensor YF-S201, results after calibration showed the error rate falls within permissible limits
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreAbstract:
The problem of poverty is one of the most important development challenges facing developing countries including Sudan for several decades. Although many efforts have been made to reduce poverty, however, its rates are increasing, and public policies adopted by the government in this regard remain elusive in achievinging its main objectives or making any significant progress. The purpose of the present study is to analyse poverty in Sudan by identifying its measurement, causes and the factors that have contributed to the increasing poverty rates over the past two decades. Also this study aims at investigating the interim poverty reduction strategy in Sudan as well as evaluates that strategy throug
... Show MoreIt is known that the science of jurisprudence is one of the most important Islamic sciences. Because it is a science that regulates the life of man and society and provides them with happiness in this world and the hereafter, if they follow its provisions with precision and care. The importance of this topic lies in the fact that it represents an urgent social need to show the compatibility of tribal customs with social jurisprudence. The job of the jurists was and still is to clarify the legal rulings according to what the Holy Qur’an has shown, and what has been reported on the authority of the Great Prophet (6) and the pure imams (:).It is no secret to everyone that the Islamic civilization is (the civilization of jurisprudence), just
... Show MorePre-breakdown phenomenon was investigated within the two, non-mixed dielectric liquids; transformation oil and cresol. Finite element technique was used to follow the initiation and growth of plasma channels (streamer discharge) within pin-plane configuration. That was done for different spacing between the pin-electrode and the liquid-liquid interface. Streamer growth model assumed that, the streamer initiation occurs at the region of the highest value of electric field. Our study shows that the streamer initiates at the tip of the pin and growths toward the other electrode. The study shows, too, that the streamer path controlled by the difference of permittivity of the two liquids and spacing distance of the liquid-liquid interface fro
... Show More