A localized stenosis or aneurysm is a discontinuity that presents the pulse wave produced by the contracting heart with a reflection site. However, neither wave speed ( c) in these discontinuities nor the size of reflection in relation to the size of the discontinuity has been adequately studied before. Therefore, the aim of this work is to study the propagation of waves traversing flexible tubes in the presence of aneurysm and stenosis in vitro. We manufactured different sized four stenosis and four aneurysm silicone sections, connected one at a time to a flexible ‘mother’ tube, at the inlet of which a single semi-sinusoidal wave was generated. Pressure and velocity were measured simultaneously 25 cm downstream the inlet of the respective mother tube. The wave speed was measured using the PU-loop method in the mother tube and within each discontinuity using the foot-to-foot technique. The stenosis and aneurysm dimensions and c were used to determine the reflection coefficient ( R) at each discontinuity. Wave intensity analysis was used to determine the size of the reflected wave. The reflection coefficient increased with the increase and decrease in the size of the aneurysm and stenosis, respectively. c increased and decreased within stenosis and aneurysms, respectively, compared to that of the mother tube. Stenosis and aneurysm induced backward compression and expansion waves, respectively; the size of which was related to the size of the reflection coefficient at each discontinuity, increases with smaller stenosis and larger aneurysms. Wave speed is inversely proportional to the size of the discontinuity, exponentially increases with smaller stenosis and aneurysms and always higher in the stenosis. The size of the compression and expansion reflected wave depends on the size of R, increases with larger aneurysms and smaller stenosis.
Thanks allah and peace be upon our prophet muhammed and upon his family and his
followers……
The name is only called by the Almighty, One of the Names of the Creator Deity
features and slavery. He is the idol who worshiped.
The creator is derived from the creation of a sophisticated and significant from create Aharaz
for crust, and tailor the gown and the end of launch on God's creation of the creature, and this
release was a matter of metaphor One of the names of Allah, God is the creator himself is not
a partner Creator of all things, is the one who created
man from Nothingness began creating Adam peace be upon him and that he has passed the
stages in the process of creation, namely: He created him from du
In the name of of Allah the Merciful
Introduction:
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon our master Muhammad and his family and companions.
After
I have looked at a part of the jurisprudence of Hajj jurisprudence, which is needed now, especially after it facilitated travel to perform Hajj and Umrah, so the need was an advocate and a list for writing in it, which is beneficial to Hajj, Umrah and the guide.
And this important part is the things that contravene the woman's man in the Hajj and after the search and tracking found that there are ten things that get the violati
... Show MoreAlthough severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.
Objective: The aim of this study is to determine the role of spiral Computerized Tomography in the diagnosis and
detection the types of stroke.
Methodology: One hundred sixty two patients (162) (99 males and 63 females) their ages ranging from (13 – 80)
year, all of them are suffering from stroke. They were collected randomly from spiral Computerized Tomography
unit in Baquba Teaching hospital during the period from November / 2010 to December / 2011 .All the patients
were examined clinically and then done spiral Computerized Tomography examination.
Results : The results of this study showed that the stroke effected different age groups and both sex but males is
more affected than the females .The results of spiral
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1
Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show More