Preferred Language
Articles
/
alkej-175
Theoretical and Practical Investigation of Blood Flow through Stenosed Coronary Lad Artery
...Show More Authors

Atherosclerosis is the most common causes of vascular diseases and it is associated with a restriction in the lumen of blood vessels. So; the study of blood flow in arteries is very important to understand the relation between hemodynamic characteristics of blood flow and the occurrence of atherosclerosis.

looking for the physical factors and correlations that explain the phenomena of existence the atherosclerosis disease in the proximal site of LAD artery in some people rather than others is achieved in this study by analysis data from coronary angiography as well as estimating the blood velocity from coronary angiography scans without having a required data on velocity by using some mathematical equations and physical laws. Fifty-eight patients were included in this study that underwent cardiac catheterization for diagnostic coronary angiography. It found some information that may explain the ability of small arteries to develop the lesions with time mainly in proximal site of LAD artery.

For investigation the fluid-structural response to pulsatile Newtonian and non-Newtonian blood flow through an axisymmetric stenosed coronary artery; the theoretical simulation is built up by using ANSYS 11, to evaluate the biomechanical parameters in the atherosclerotic process. Rigid and Newtonian cases were investigated to provide an understanding on the effects of incorporating the Fluid-Structural Interaction (FSI) into the model. For validation of the models and methods used, the computation results are compared with the previous studies. The non-Newtonian Carreau model was investigated with FSI, which showed a little difference in comparison with the Newtonian flow model in terms of velocity, pressure, wall shear stress (WSS), and stress distribution.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 02 2009
Journal Name
Journal Of Educational And Psychological Researches
صعوبات تدريس مادة التاريخ الأوربي لمرحلة الخامس الأدبي دراسة تطبيقية من وجه نظر المدرسين
...Show More Authors

اهمية البحث :

أصبح التغير المتسارع في جميع مجالات الحياة يمثل السمة المميزة لعصرنا الحالي ونتيجة التغير فقد برزت الحاجة إلى تطوير برامج المؤسسات التربوية والتعليمية لكي تواكب تلك التغيرات خاصة وان الصيحات تعالت من هنا وهناك لا عادة النظر في العلمية التربوية ومحتواها وأهدافها ووسائلها بما يتح للمتعلم الاستفادة القصوى من الوسائل والأدوات التعليمية في رفع مستوى تحصيله الدارس واكت

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
دراسة حصانة مقدرات بيز التجريبي (الخبري) Empirical Bayse لنماذج الانحدار الذاتي من الدرجة الأولى
...Show More Authors

  Estimation stage is one of most important in process of selecting and identification for fit model, this model gives a best results if the good methods of estimation are depended on, one of those methods is Bayes method for estimation the parameters, it puts an assumption that parameter have a distribution.

 This paper studies the robustness of estimators of empirical Bayes to know the properties of those estimators.

    

 

 

 

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 26 2023
Journal Name
Arab Science Heritage Journal
غسل الحيض من خلال كتاب شرح ابن كمال باشا على أول الهداية ( دراسة وتحقيق )
...Show More Authors

This study deals with the field of acieving the manuscripts of Islamic sciences by the great Imam ibn Kamal Pasha, but the mentioned book requires a great effort to explain what it contains of sciences, and to appear what it has contained

View Publication Preview PDF
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
Die sytaktische Struktur und semantische Bedeutung der konzessiven Ausdrucksmöglichkeiten im Deutschen und Arabischen Eine interpretierende Studie Voegelegt von Hochschullehrer
...Show More Authors

Die vorliegende Forschung erklärt ein sprachliches Phänomen im Deutschen und Arabischen, dessen Aspekte die Grund-Folge-Relation (Kausalität) im Allgemeinen sowie den wirkungslosen Gegengrund (Konzessivität) im Besonderen behandeln.
In diesem Kontext wird der Unterschied der verschiedenartigen Gründe der Kausalität im Deutschen, wie wirklicher Grund (kausal), möglicher Grund (konditional) und wirkungsloser bzw. unzureichender Gegengrund (konzessiv) gezeigt.
Die theoretischen Darlegungen der konzessiven Ausdrucksmittel in dieser Forschungsarbeit werden durch diverse praktische Beispiele aus der deutschen und arabischen Literatur fundamentiert.
Das Hauptziel dieser Forschungsarbeit liegt darin, gleichermaßen beim arabische

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 02 2026
Journal Name
College Of Education For Women Journal
أساليب التضليل الإعلامي وانعكاسها على تشكيل الرأي العام دراسة ميدانية على جمهور مدينة بغداد
...Show More Authors

،يريغت وأ ةلكشم وأ ةثداح ةجيتن ،ةعمالجا وأ درفلا هذختي فقوم هرهوج في ماعلا يأرلا دعي ةيوبرت تماكارتو ،ةيرثك تانوكم لىع هسسأ في موقي وهف اذل ،ةشاعلما ةايلحا تاقايس في لصيح فيو ،عمتمج يلأ يعماتجلاا لعفلا ةيصوصخ تاقايس بسحب يرسي ايرطف نوكي ام اهنم ،ةيفاقثو يعولا ةلاح تيبثت ديرت تاهج نم ةلعتفمو ةعنطصم تايطعمب اهيريست وأ اهذحش متي ىرخأ نايحأ ليكشت ةيلمع تنترقا ذل ،ةثدالحا كلت مهف ةأطو ليلقت وأ يريغت وأ فرح وأ ي

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
أسس تسوية مطالبات التأمين البحري دراسة حالة: سوق التأمين السوداني (للفترة 2005 - 2009 م)
...Show More Authors

This research reviews the basis for the settlement of claims when marine losses occur, including the settlement of claims in the case of joint maritime losses for goods and ship objects, as well as the settlement of claims for damage to vessel objects when they are at sea risk and loss   during the sea voyage.   Construction

    The Research used descriptive, analytical and historical methods in preparing the research; the society of study composed of the employee in the insurance companies working in Sudan, the questionnaire was distributed for all study samples.  The study concluded some important results of which it is , there is a weak of awareness, and lack of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
المحددات الاجتماعية لمهنــة المرأة دراسة ميدانية من وجهة نظر أساتذة جامعة بغداد مجمع الجادريـــة
...Show More Authors

The conventional view to women is still in society due to the male domination on society and the social values. Since women and the costumes and women. Since women is not half the society, but half of its potential energy that is capable of working. Giving her the chance to work according to her efficiency and ability and academic achievement is a justice in the distribution of professions between the sexes without discrimination. Women bear the responsibility of correcting the view created by men.

The importance of this study comes from knowing the most important social limitations of women work in society which effect on many aspects in her life like choosing a career suiting hers and the range of women working in the universit

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Collection, Storage and Protein Extraction Method of Gingival Crevicular Fluid for Proteomic Analysis
...Show More Authors

Gingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref