Preferred Language
Articles
/
S2E2LZkBdMdGkNqjdCMU
Design, analysis and construction of a simple pulse duplicator system
...Show More Authors

One of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system without going into the system design by steps or what are the main part of this system and how can be implemented, tested, and developed individually. In this design, a DC motor produces, through a hydraulic piston, a flow pulse to the left ventricle chamber model, which is linked with two interchangeable prosthetic heart valves. The computer is used to control and process data from volumetric flow rate and image. The findings show that the linear displacement, the velocity of the piston and the linear acceleration regularly become significant particularly and follows a sinusoidal wave shape during one cycle, when (crank length/connecting rod length) value is equal 0.2 or less. Several sets of measured flow rate readings were obtained by using flow meter sensor YF-S201, results after calibration showed the error rate falls within permissible limits

Scopus Crossref
View Publication
Publication Date
Fri Feb 10 2012
Journal Name
Molecules
Design, Synthesis and Preliminary Pharmacological Evaluation of New Non-Steroidal Anti-Inflammatory Agents Having a 4-(Methylsulfonyl) Aniline Pharmacophore
...Show More Authors

A series of 4-(methylsulfonyl)aniline derivatives were synthesized in order to obtain new compounds as a potential anti-inflammatory agents with expected selectivity against COX-2 enzyme. In vivo acute anti-inflammatory activity of the final compounds 11–14 was evaluated in rat using an egg-white induced edema model of inflammation in a dose equivalent to 3 mg/Kg of diclofenac sodium. All tested compounds produced significant reduction of paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the activity of compounds 11 and 14 was significantly higher than that of diclofenac sodium (at 3 mg/Kg) in the 120–300 minute time interval, while compound 12 expressed a comparable effect to that of di

... Show More
View Publication
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Acculturation and its Evolutionary Tendency in the Design of the Prayer Space Elements / Niche – A model: آلاء طالب كريم
...Show More Authors

The peculiarity of worship spaces in the Islamic architecture is evident by its symbolic connotations with doctrinal connections, thus the niche has a major status in that symbolic connotation, which transformed due to the cultural interaction from a rock on the wall directed towards Mecca into an element of integrated structural entity with performative and aesthetic characteristics. The spread of the Islamic religion contributed to subjecting it to a design acculturation process, thus the problem of the research was raised by the following question: has the evolutionary tendency of acculturation been able to effect a major transformation in the niche design? The research aims at identifying the design acculturation and its translation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The value of work to the Elits of prophets and its influence on cultural construction
...Show More Authors

Praise be to Allah and peace and blessings be upon our Prophet Muhammad and on his family and companions
Yet,
The prophets (peace be upon them) urged all thevalues and one of these is the value of work which is of a great importance, that all nations have gathered against us as the eaters gather at a bowl. One of the reasons of our weakness and the strength of our enemy is that we have neglected the value of work. And rather a large number of ignorant and uneducatedpeople started to believe that the means of living, triumph, gaining power, and establishing a civilization are given by Allah with neithergainingnoreffort from us. While we find in the past that Allah the Almighty narrated to us the story of Mary (Peace be upon her) and

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Transethosomes a novel transdermal drug delivery system for antifungal drugs
...Show More Authors

Scopus (11)
Scopus
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Construction Joints on Performance of Reinforced Concrete Beams
...Show More Authors

Construction joints are stopping places in the process of placing concrete, and they are required because in many structures it is impractical to place concrete in one continuous operation. The amount of concrete that can be placed at one time is governed by the batching and mixing capacity and by the strength of the formwork. A good construction joint should provide adequate flexural and shear continuity through the interface.

In this study, the effect of location of construction joints on the performance of reinforced concrete structural elements is experimentally investigated.

Nineteen beam specimens with dimensions of 200×200×950 mm were tested. The variables investigated are the location of the construction joints

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The nature of financial system Is it an necessity or A selection?
...Show More Authors

   The Financial systems can be classified into two types. The first is the market–oriented, which is applied in United States and United Kingdom. While the second is bank-oriented as in Japan and Germany.

   This study tries to explain the reasons which make some countries adopt the first one instead of the second, and the contrary. So the study consists of three sections. The first deals with the concept of financial system and it are functions. The second displays the indicators which are used to classify the financial systems, while the third one is devoted to the factors that determine the type of financial system .These sections followed by some conclusions.

View Publication Preview PDF
Crossref