This research studying the phenomenon of Doppler (frequency Doppler) as a method through which the direction and speed of the blood cells flows in blood vessels wear measured. This Doppler frequency is relied upon in medicine for measuring the speed of blood flow, because the blood flow is an important concept from the concepts of medicine. It represents the function and efficient of the heart and blood vessels in the body so any defect in this function will appear as a change in the speed of blood flow from the normal value assumed. As this speed changes alot in cases of disease and morbidity of the heart, so in order to identify the effect of changing the Doppler frequency on the speed of blood flow and the relationship of this frequency with the angles of transitions and receptions and the effect of changing the ultrasound transmitted frequencies on the measured velocities .The Doppler ultrasound system has been used which is more efficient and easier to be widely used as a practical application in Al Yarmouk Teaching Hospital on two subjects. The normal had a natural medical history in the blood vessels, and abnormal had carotid artery stenosis. This device will give the flow velocity of blood in the blood vessels which is useful to the examiner, the equation of Doppler as a mathematical model in the research is adopted the measured speed to clarify the amount of change in the frequency (shift in frequency). This speed was measured in five different blood vessels, large arteries (abdominal aorta and carotid artery in the neck) and large veins (the inferior vena cava across the abdomen and the external Jugular vein in the neck) and capillaries in the hand and fingers. Then using the measured velocities in these vessels the Doppler frequency was calculated from this mathematical model using MATLAB program, was found that as velocity of the blood increases, so does the Doppler frequency and vice versa. The greater the value of the Doppler angle used in the device then the Doppler frequency decreased and vice versa. As well as increasing the transmitted frequency giving an increase in the speed of blood flow and in the Doppler frequency and vice versa. It was observed during the practical work that it was possible to get the speed of blood flow in different blood vessels, arteries and veins easily, but to less extent in the capillary vessels since in fact the value of the received frequency was very small.
The concept of epiform modules is a dual of the notion of monoform modules. In this work we give some properties of this class of modules. Also, we give conditions under which every hollow (copolyform) module is epiform.
The aim of this research is to study some types of fibrewise fuzzy topological spaces. The six major goals are explored in this thesis. The very first goal, introduce and study the notions types of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j={δ,θ,α,p,s,b,β} The second goal is to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuz
... Show MoreIt is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.
The purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
in this paper the notion of threshold relations by using resemblance relation are introduced to get a similarity relation from a resemnblance relation R
<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t
... Show More