This study proposes a mathematical approach and numerical experiment for a simple solution of cardiac blood flow to the heart's blood vessels. A mathematical model of human blood flow through arterial branches was studied and calculated using the Navier-Stokes partial differential equation with finite element analysis (FEA) approach. Furthermore, FEA is applied to the steady flow of two-dimensional viscous liquids through different geometries. The validity of the computational method is determined by comparing numerical experiments with the results of the analysis of different functions. Numerical analysis showed that the highest blood flow velocity of 1.22 cm/s occurred in the center of the vessel which tends to be laminar and is influenced by a low viscosity factor of 0.0015 Pa.s. In addition, circulation throughout the blood vessels occurs due to high pressure in the heart and the pressure becomes lower when it returns from the blood vessels at the same parameters. Finally, when the viscosity is high, the extreme magnitudes of blood flow tend toward the vessel wall at approximately the same velocity and radius of the gradient.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreRating systems for evaluating the sustainability of communities are an essential tool that is increasingly applied throughout the developed world to set criteria indicators to optimize the physical, social, economic, and environmental potential within such communities. Rating systems vary based on existing disparities among societies and their unique building and physical planning practices. Iraqi cities lacked the adaptation of a formal methodology or sustainability rating system to correctly measure the built environment’s sustainability indicators. This research attempts to review the most substantial rating systems to measure the sustainability of communities worldwide to form a
In this work, As60Cu40-xSex thin films were synthesized, and the pulsed laser deposition method was used to study the effected partial replacement of copper with selenium. The electrical characteristics and optical characteristics, as indicated by the absorbance and transmittance as a function of wavelength were calculated. Additionally, the energy gap was computed. The electrical conductivity of the DC in the various conduction zones was calculated by measuring the current and voltage as a function of temperature. Additionally, the mathematical equations are used to compute the energy constants, electron hopping distance, tail width, pre-exponential factor, and density of the energy states in variation zones (densities of the energ
... Show MoreAs major nosocomial pathogens,
In this study, 20
In this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.
The research aims to achieve proof of convergence between optimal costs and standard costs in calculating costs for the economic unit, support efforts aimed at adopting optimal costs in cost accounts and accounting thought in general, and achieve benefit from the theory of convergence between optimal costs and standard costs in the field of achieving actual costs in The economic unit in order to reduce and converge, and this came to address the possibility of adopting the concept of optimal costs in the production costs calculations for the purposes of rationalizing administrative decisions, and rationalizing the preparation of financial statements within management accounting.
The research concluded that
... Show More
ABSTRUCT
The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.
A purposive non-random
... Show More