One of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system without going into the system design by steps or what are the main part of this system and how can be implemented, tested, and developed individually. In this design, a DC motor produces, through a hydraulic piston, a flow pulse to the left ventricle chamber model, which is linked with two interchangeable prosthetic heart valves. The computer is used to control and process data from volumetric flow rate and image. The findings show that the linear displacement, the velocity of the piston and the linear acceleration regularly become significant particularly and follows a sinusoidal wave shape during one cycle, when (crank length/connecting rod length) value is equal 0.2 or less. Several sets of measured flow rate readings were obtained by using flow meter sensor YF-S201, results after calibration showed the error rate falls within permissible limits
A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreThe main problem of the current study concentrates on applying critical discourse analysis to examine textual, discoursal and social features of reduplication in some selected English newspaper headlines. The main aim of the current study is to analyze the linguistic features of reduplication by adopting Fairclough's three-dimensional model (2001). This study sets forth the following hypotheses: (1) English headline – newspapers comprise various textual, discoursal and social features ;(2)the model of analysis is best suited for the current study.To achieve the aims and verify the hypotheses, a critical discourse analysis approach is used represented by Fairclough's socio-cultural approach (2001).The present study has examined the use of
... Show MoreBN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreAgricultural companies could push investment forward and help in production base variation and developing production techniques. They also play a significant role in organizing and providing requirements of market economy. This work aimed at studying economic efficiency of the six agricultural companies that are registered at Iraqi stock market for the period 2005-2016. Capital of these companies was between (300 million-7.5 billion IQD). Several financial analysis indicators were applied such as activity percentages. Average of capital circulation was 0.91 for private company of agricultural production، and lowest share was for Iraqi company for producing and marketing field crops. Assets average circulation was highest for the pr
... Show MoreThe construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreThis article focuses on identity construction and social structures within the Sāmoan community as represented in Sia Figiel’s novel Where We Once Belonged. I argue that however the post/colonial Sāmoan identity is hybridized, the essence of the individual is still connected to Fa’a Sāmoa-the Sāmoan traditions and ways. However rapid are the colonial vicissitudes, the Sāmoan literature and lifestyle are developed to be a resistance platform. This resistance platform is dedicated not only to expose the colonial impact but also to assist the social and political reconstruction of post/colonial Samoa. To this end, this article studies identity construction, and the challenges that women face within Sāmoan social structures.
In Iraq, more than 1031 school projects have been halted due to disputes and claims resulting from financial, contractual, or other issues. This research aims to identify, prioritize, and allocate the most critical risk factors that threaten these projects’ success for the duration (2017-2022). Based on a multi-step methodology developed through systematic literature reviews, realistic case studies, and semi-structured interviews, 47 risk factors were identified. Based on 153 verified responses, the survey reveals that the top-ranked risk factors are corruption and bribery, delaying the payments of the financial dues to the contractors or sub-contractors, absence of risk management strategy, multiple change orders due
... Show More