Shatt Al-Hilla was considered one of the important branches of Euphrates River that supplies irrigation water to millions of dunams of planted areas. It is important to control the velocity and water level along the river to maintain the required level for easily diverting water to the branches located along the river. So, in this research, a numerical model was developed to simulate the gradually varied unsteady flow in Shatt AL-Hilla. The present study aims to solve the continuity and momentum (Saint-Venant) equations numerically to predict the hydraulic characteristics in the river using Galerkin finite element method. A computer program was designed and built using the programming language FORTRAN-77. Fifty kilometers was considered starting from downstream of Hindiyah Barrage towards Hilla City. The gathered field measurements along different periods were used for the purpose of calibration and verification of the model. The results show that the suitable Manning roughness was 0.023. A comparison with field observations was conducted to identify the validity of the numerical solution of the flow equations. The obtained results indicate the feasibility of the numerical techniques using a weighting factor of 0.667 and a time increment of 6 hr. High accuracy and good agreement were achieved, and minimum Root Mean Square Error (RMSE) of 0.029 was gained for the obtained results compared with the corresponding field observations.
Functional dyspepsia is one of the most common gastrointestinal symptoms and attributed to various causes including Helicobacter pylori infection. AIM OF THE STUDY: To correlate Helicobacter pylori infection to functional dyspepsia and to identify the possible risk factors for this infection. PATIENTS AND METHODS: Fifty patients who were referred to the endoscopy unit for dyspepsia symptoms, secondary gastric causes of dyspepsia were excluded during endoscopy, gastric biopsies were taken for histopathological study and for bedside urease test for detection of Helicobacter pylori infection. RESULTS: 62% of non-ulcer dyspeptic patients were infected with Helicobacter pylori, 74.2% of the patients were above 30 years old, female gender patient
... Show MoreIntroduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomograp
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More