The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε VO.
Atherosclerosis is the most common causes of vascular diseases and it is associated with a restriction in the lumen of blood vessels. So; the study of blood flow in arteries is very important to understand the relation between hemodynamic characteristics of blood flow and the occurrence of atherosclerosis.
looking for the physical factors and correlations that explain the phenomena of existence the atherosclerosis disease in the proximal site of LAD artery in some people rather than others is achieved in this study by analysis data from coronary angiography as well as estimating the blood velocity from coronary angiography scans without having a required data on velocity by using some mathematical equations and physical laws. Fif
... Show MoreThis research concerns study the crack growth in the wall of pipes made of low carbon steel under the impact load and using the effect of hygrothermal (rate of moisture 50% and 50℃ temperature). The environmental conditions were controlled using high accuracy digital control with sensors. The pipe have a crack already. The test was performed and on two type of specimens, one have length of 100cm and other have length 50cm. The results were, when the humidity was applied to the pipe, the crack would enhance to growth (i.e. the number of cycles needed to growth the crack will reduce). In addition, when the temperature was increase the number of cycles needed to growth the crack are reduced because the effect of heat on the mechanical pro
... Show MoreThe problem of water scarcity is becoming common in many parts of the world, to overcome part of this problem proper management of water and an efficient irrigation system are needed. Irrigation with a buried vertical ceramic pipe is known as a very effective in the management of irrigation water. The two- dimensional transient flow of water from a buried vertical ceramic pipe through homogenous porous media is simulated numerically using the HYDRUS/2D software. Different values of pipe lengths and hydraulic conductivity were selected. In addition, different values of initial volumetric soil water content were assumed in this simulation as initial conditions. Different value
... Show MoreThe prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis
Reconstruction of female identity is one of the important issues in modern times. The majority of the females who descent from the countries of the third world confront lots of problems because of their race and gender. Black females or colored skin females because of the oppression of the white society upon them, try hard to cope with society in order to get some relief and feel that they are part of this cruel white society. One of the solutions for these black females is to reconstruct their identity by mimicry to the English beauty standards. Zadie Smith is a postcolonial author. She deals with third- world women and how they are treated in a minority and in a racist way. She strives to empower the subaltern black females who ha
... Show MoreAn experimental and numerical study has been carried out to investigate the forced convection heat transfer by clean or dusty air in a two dimensional annulus enclosure filled with porous media (glass beads) between two vertical concentric cylinders. The outer cylinder is of (82 mm) outside diameters and the inner cylinder of (27 mm) outside diameter. Under steady state condition; the inner cylinder surface is maintained at a high temperature by applying a uniform heat flux and the outer cylinder surface at an ambient temperature. The investigation covered values of input power of (6.3, 4.884, 4.04 and 3.26 W), Reynolds number values of (300, 700, 1000, 1500, and 2000) and dust ratio values (density number N) of (2, 4, 6 and 8). A comput
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More
