The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstrates the methods’ ability to detect the location and severity of an aortic aneurysm through the analysis of flow waveforms in clinically accessible locations. Therefore, the proposed methodology shows a high potential for non-invasive aneurysm detectors/monitors.
This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThis study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.
A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the
... Show MoreDBN Rashid, Rimak International Journal of Humanities and Social Sciences, 2020
The object of this research is to determine the effect in the differences of the correlation pattern of the micro blogging on the educational attainment of computer science curriculum for 12th grade students. I will try to test the best suited correlation and I might use the demo curriculum as well to achieve its objectives , The research method that will be used in this research is the quantitative method where we will use a sample of 60 students divided into two groups ( correlate the micro blogging - adopted the sequence pattern of relating the micro blogging) As a result, we found out that there are quantitative differences among the two groups' median , The differences goes back to the main effect of the correlation pattern of the m
... Show MoreThe responsibility of the Central Bank through the implementation of its monetary policy to maintain the integrity and stability of the financial system and the economic system, because any shock, whether internal or external, may endanger the financial system and instability, so the research sheds light on the effectiveness of monetary policy in maintaining financial stability, The most important conclusion is that there is an increase in capital, which gives banks the possibility to face the risks to which they are exposed, as well as a rise in the total bad debts, which weakens its financial position, which constitutes a decline in the financial stability of these banks.
This work was conducted to study the ability of locally prepared Zeolite NaY for the reduction of sulfur compounds from Iraqi natural gas by a continuous mode adsorption unit. Zeolite Y was hydrothermally synthesized using abundant kaolin clay as aluminum precursor. Characterization was made using chemical analysis, XRD and BET surface area. Results of the adsorption experiments showed that zeolite Y is an active adsorbent for removal H2S from natural gas and other gas streams. The effect of temperature was found inversely related to the removal efficiency. Increasing bed height was found to increase the removal efficiency at constant flow rate of natural gas. The adsorption capacity was evaluated and its maximum uptake was 5.345 mg H2S/g z
... Show MoreThis work was conducted to study the ability of locally prepared Zeolite NaY for the reduction of sulfur compounds from Iraqi natural gas by a continuous mode adsorption unit. Zeolite Y was hydrothermally synthesized using abundant kaolin clay as aluminum precursor. Characterization was made using chemical analysis, XRD and BET surface area. Results of the adsorption experiments showed that zeolite Y is an active adsorbent for removal H2S from natural gas and other gas streams. The effect of temperature was found inversely related to the removal efficiency. Increasing bed height was found to increase the removal efficiency at constant flow rate of natural gas. The adsorption capacity was evaluated and its maximum uptake was 5.345 mg H2S/g z
... Show More