One of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system without going into the system design by steps or what are the main part of this system and how can be implemented, tested, and developed individually. In this design, a DC motor produces, through a hydraulic piston, a flow pulse to the left ventricle chamber model, which is linked with two interchangeable prosthetic heart valves. The computer is used to control and process data from volumetric flow rate and image. The findings show that the linear displacement, the velocity of the piston and the linear acceleration regularly become significant particularly and follows a sinusoidal wave shape during one cycle, when (crank length/connecting rod length) value is equal 0.2 or less. Several sets of measured flow rate readings were obtained by using flow meter sensor YF-S201, results after calibration showed the error rate falls within permissible limits
An experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show MoreАннотация
Взгляд на пол как на комплексное социальное отношение означает,что роль женщины в истории следует рассматривать не просто как новый для исторической науки предмет исследования, а как обойденный вниманием ученых вопрос об отношениях между людьми или группами людей.
Женщина играет особую и важную роль в обществе , даже скажут ,что она половина нашего общества ,поэтому она яв
... Show MoreIssam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
Surah Al-Baqarah (verse 55-911)
This study deals with examining UCAS students’ attitudes in Gaza towards learning Arabic grammar online during the Corona pandemic. The researcher has adopted a descriptive approach and used a questionnaire as a tool for data collection. The results of the study have statistically shown significant differences at the level of "0.01" between the average scores of students in favor of the students of the humanities specializations. It has also been found that the students’ attitudes at the Department of Humanities and Media towards learning Arabic grammar online are positive. Additionally, the results revealed no statistical significant differences due to the variable of UCAS students’ scientific qualifications. The results stressed
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show More