The prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis
The main source of water supply in Iraq is the surface water, especially Tigris and Euphrates Rivers and their tributaries. In the recent years there was a great drop in the water levels of Tigris River within Baghdad City which had affected the operation of twelve water supply projects located on the banks of Tigris River in Baghdad City, due to significant climate changes, and the expansion of hydraulic construction (dams) and implementation of new irrigation projects in Turkey, these factors have greatly reduced the water flowrates of river by about 46%. In the present study the flow characteristics of Tigris River within Baghdad City was studied, the reach involved was about 49km in which it represents the urban zone
... Show MoreNowadays, the power plant is changing the power industry from a centralized and vertically integrated form into regional, competitive and functionally separate units. This is done with the future aims of increasing efficiency by better management and better employment of existing equipment and lower price of electricity to all types of customers while retaining a reliable system. This research is aimed to solve the optimal power flow (OPF) problem. The OPF is used to minimize the total generations fuel cost function. Optimal power flow may be single objective or multi objective function. In this thesis, an attempt is made to minimize the objective function with keeping the voltages magnitudes of all load buses, real outp
... Show MoreThis study employs a critical discourse analysis approach to investigate the linguistic and discursive mechanisms employed by the prominent Russian online news platform Gazeta.ru in its coverage of social news. Drawing on an interdisciplinary framework integrating critical discourse analysis (CDA), media discourse analysis, and sociolinguistic perspectives, the research examines how language is used to construct and disseminate societal narratives. The analysis focuses on a dataset of Gazeta.ru articles published in March 2024, encompassing topics such as health, travel, and consumer affairs. Through a multi-level analytical approach, the study explores macro-level discursive strategies and microlevel linguistic choices, unveiling the intri
... Show MoreCryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand
... Show MoreLearning a foreign language is a highly interactive process, and a belief that communicative activities foster a great amount of linguistic production provides language practice and opportunities for negotiation of meaning during communicative exchanges. Thus, this study examines what benefits learner-centered classroom setting offers compared with that of teacher–centered classroom, and how less proficient learners accomplish their tasks and activities with scaffolded help during interaction with the help of proficient classmates and under the guidance of a skilful person, i.e., the teacher. The subjects participating in this study are 30 Iraqi 4th year college students in the Department of English, College of Arts , Univer
... Show MoreIn this research was the study of the educational values when Shafei, contained in hair Shafi'i, and that what the role of these values in the education of generations, and the possibility of their application in the educational curriculum. Find addressed Shafei life and his time. The values derived from his hair, as well as quoting from the Koran and influenced by it, which is evident in the hair, governance and eating Alomthal.okzlk Find the importance of this thought in modern education, so as to realism and ease of application. It is the search results, the Shafi'i put thought educationally integral based on the Koran rise to the level of theory. Find and conclusions: that education in its present situation
... Show MoreIn order to activate theatrical discourse aware of the changes imposed by the nature of the contemporary child in terms of stimulating the social skills that achieve a technical and aesthetic convergence between him and theatrical presentation by investing the fact of the existence of the child and its potential in the weaving of stories, and folk in the imagination, and simulation of what corresponds with the characters and icons interact with them through technologies In the light of this research came the following address: (ways to stimulate the skills of the child through a contemporary theatrical speech) where the researcher seeks to delineate the importance involved in the discourse of theater through ways to reach the pillars con
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreDoubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent. The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average weight of their word are constructed. Second, the degree of cl
... Show More