The ring modulator described in part I of this paper is designed here for two operating wavelengths 1550nm and 1310nm. For each wavelength, three structures are designed corresponding to three values of polymer slot widths (40, 50 and 60nm). The performance of these modulators are simulated using COMSOL software (version 4.3b) and the results are discussed and compared with theoretical predictions. The performance of intensity modulation/direct detection short range and long rang optical communication systems incorporating the designed modulators is simulated for 40 and 100Gb/s data rates using Optisystem software (version 12). The results reveal that an average energy per bit as low as 0.05fJ can be obtained when the 1550nm modulator is designed with a phase shifter length equals twice the coupling length.
Asphaltene is a component class that may precipitate from petroleum as a highly viscous and sticky material that is likely to cause deposition problems in a reservoir, in production well, transportation, and in process plants. It is more important to locate the asphaltene precipitation conditions (precipitation pressure and temperature) before the occurring problem of asphaltene deposition to prevent it and eliminate the burden of high treatment costs of this problem if it happens. There are different models which are used in this flow assurance problem (asphaltene precipitation and deposition problem) and these models depend on experimental testing of asphaltene properties. In this study, the used model was equation of
... Show MoreShatt Al-Hilla was considered one of the important branches of Euphrates River that supplies irrigation water to millions of dunams of planted areas. It is important to control the velocity and water level along the river to maintain the required level for easily diverting water to the branches located along the river. So, in this research, a numerical model was developed to simulate the gradually varied unsteady flow in Shatt AL-Hilla. The present study aims to solve the continuity and momentum (Saint-Venant) equations numerically to predict the hydraulic characteristics in the river using Galerkin finite element method. A computer program was designed and built using the programming language FORTRAN-77. Fifty kilometers was consid
... Show MoreThe mechanical function of the heart is governed by the contractile properties of the cells, the mechanical stiffness of the muscle and connective tissue, and pressure and volume loading conditions on the organ. Although ventricular pressures and volumes are available for assessing the global pumping performance of the heart, the distribution of stress and strain that characterize regional ventricular function and change in cell biology must be known. The mechanics of the equatorial region of the left, ventricle was modeled by a thick-walled cylinder. The tangential (circumferential) stress, radial stress and longitudinal stress in the wall of the heart have been calculated. There are also significant torsional shear in the wall during b
... Show MoreFH Ghanim, Journal of Global Pharma Technology, 2018
Background: Direct measurement of intracellular magnesium using erythrocytes has been suggested as a sensitive indicator for the estimation of body magnesium store. Marked depletion in plasma and erythrocyte magnesium levels was particularly evident in diabetic patients with advanced retinopathy and poor diabetic control. While insulin has been shown to stimulate erythrocyte magnesium uptake, hyperglycemia per se suppressed intracellular magnesium in normal human red cells.
Aim of the study: To investigate the erythrocyte magnesium level in Iraqi type I and II diabetic patients, with specific emphasis on the effect of both, metabolic control and the type of antidiabetic treatments.
Methods: Sixty two diabetic patients (7 with type
The aim of the currnet study to examine the effect of subclinical hypothyroidism (SCH) in diabetic patients on coagulation parameters. This retrospective case–control study involves 130 patients diagnosed with type 2 diabetes mellitus (T2DM), divided into 65 T2DM with newly diagnosed SCH and 65 euthyroid (EUT) T2DM patients without SCH. Fibrinogen (FIB) was significantly higher in SCH (508.2 ± 63.0 mg/dL) than EUT (428.1 ± 44.8 mg/dL). In the SCH patients, FIB correlated with several parameters, such as age (β = 0.396), body mass index (β = 0.578), glycated hemoglobin (β = 0.281), and activated partial thromboplastin time (β = 0.276). In conclusion SCH in DM patients appears to increase the magnitude of coagulopathy.
... Show MoreBN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
The advent of UNHCR reports has given rise to the uniqueness of its distinctive way of image representation and using semiotic features. So, there are a lot of researches that have investigated UNHCR reports, but no research has examined images in UNHCR reports of displaced Iraqis from a multimodal discourse perspective. The present study suggests that the images are, like language, rich in many potential meanings and are governed by clearly visual grammar structures that can be employed to decode these multiple meanings. Seven images are examined in terms of their representational, interactional and compositional aspects. Depending on the results, this study concludes that the findings support the visual grammar theory and highlight the va
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More