This research studying the phenomenon of Doppler (frequency Doppler) as a method through which the direction and speed of the blood cells flows in blood vessels wear measured. This Doppler frequency is relied upon in medicine for measuring the speed of blood flow, because the blood flow is an important concept from the concepts of medicine. It represents the function and efficient of the heart and blood vessels in the body so any defect in this function will appear as a change in the speed of blood flow from the normal value assumed. As this speed changes alot in cases of disease and morbidity of the heart, so in order to identify the effect of changing the Doppler frequency on the speed of blood flow and the relationship of this frequency with the angles of transitions and receptions and the effect of changing the ultrasound transmitted frequencies on the measured velocities .The Doppler ultrasound system has been used which is more efficient and easier to be widely used as a practical application in Al Yarmouk Teaching Hospital on two subjects. The normal had a natural medical history in the blood vessels, and abnormal had carotid artery stenosis. This device will give the flow velocity of blood in the blood vessels which is useful to the examiner, the equation of Doppler as a mathematical model in the research is adopted the measured speed to clarify the amount of change in the frequency (shift in frequency). This speed was measured in five different blood vessels, large arteries (abdominal aorta and carotid artery in the neck) and large veins (the inferior vena cava across the abdomen and the external Jugular vein in the neck) and capillaries in the hand and fingers. Then using the measured velocities in these vessels the Doppler frequency was calculated from this mathematical model using MATLAB program, was found that as velocity of the blood increases, so does the Doppler frequency and vice versa. The greater the value of the Doppler angle used in the device then the Doppler frequency decreased and vice versa. As well as increasing the transmitted frequency giving an increase in the speed of blood flow and in the Doppler frequency and vice versa. It was observed during the practical work that it was possible to get the speed of blood flow in different blood vessels, arteries and veins easily, but to less extent in the capillary vessels since in fact the value of the received frequency was very small.
תקציר
העיון הזה מדבר על דבר ההשגה על הטקסטים המקראיים בידי כמה מסופרים ופילוסופים יהודים אשר הושפעו מהרעיונותיהם של הפילוסופים האירופיים מחד גיסא, ואת הרעיונות של ההשכלה מאידך גיסא. היהודים היו חיים בבידוד, ותחת השליטה של הרבנות (רבנים) שהייתה שליטה מוחלטת. כבר העבודה של הרבנות מאז ימי קדם להעלות רעיונות במוחם של היהודים בתור העם הנבחר, והם מעולים ועדיפים על בני אדם. הם כל כך מסתמכים על פסוקים מה
... Show MoreMuch has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
The searchers opinions are variant in determining the extent of impacting political risk in the host country on foreign direct investment decision. (Aharoni,1966) found, in his questionary study for group of foreign companies operating in India, that a political stability is one of the two most important factors, besides the market size, in the attraction of foreign investment, and its availability means that whether this specific country is good for foreign investment. On the other side, (Green and Benntt, 1972) are present a variant opinion to Aharonis opinion. They are reach to result state that a political instability do not impact on the general distribution of foreign i
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreHighlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreAbstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreWhat linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law
Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.