Stroke is the second largest cause of death worldwide and one of the most common causes of disability. However, several approaches have been proposed to deal with stroke patient rehabilitation like robotic devices and virtual reality systems, researchers have found that the brain-computer interfaces (BCI) approaches can provide better results. In this study, the electroencephalography (EEG) dataset from post-stroke patients were investigated to identify the effects of the motor imagery (MI)-based BCI therapy by investigating sensorimotor areas using frequency and time-domain features and to select particular methods that help in enhancing the MI-based BCI systems for stroke patients using EEG signal processing. Therefore, to detect the imagined movements that are typically required within conventional rehabilitation therapy with good identification accuracies, the conventional filters and wavelet transform (WT) denoising technique was used in the first stage. Next, attributes from frequency and entropy domains were computed. Finally, support vector machine (SVM) classification techniques were utilized to test the motor imagery (MI)-based BCI rehabilitation. The results demonstrate the capability of the WT denoising technique together with the used features and SVM classifier to discriminate the tested classes of the left hand, right hand and foot MI-based BCI rehabilitation. This study will help medical doctors, clinicians, physicians and technicians to introduce a good rehabilitation program for post-stroke patients.
Inflammatory bowel disease includes both Crohn’s disease and ulcerative colitis, is a chronic, progressive relapsing disease of gastrointestinal tract that require long-term treatment or maintenance therapy. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an important factor that affects compliance of the patient in whom having positive beliefs is a prerequisite for better compliance. The aim of the current study was to investigate and assess beliefs about medicines among a sample of Iraqi patients with inflammatory bowel disease and to determine possible association between these beliefs and some patient-specific factors.
This study is a cross-sectional study carried out o
... Show MoreInsulin-induced hyperglycemia is the hallmark of diabetes mellitus (DM), including various metabolic disorders. Diabetic people are more likely to develop dyslipidemia, hypertension, and obesity. Type 2 diabetes (T2DM), the most common illness, is generally asymptomatic in its early stages and can go misdiagnosed for years. Diabetes screening may be beneficial in some cases since early identification and treatment can lessen the burden of diabetes and its consequences. This study aimed to find the relationship between Glycated hemoglobin (HbA1c) and lipid profile components in T2DM patients. This descriptive-analytical and cross-sectional study was performed on the control group and T2DM patients in Medical City in Baghdad be
... Show MoreRheumatoid arthritis is one of the common chronic disease, which lead to great disability and chronic pain, and has a main adverse economic and social effect upon patients. The reason for the addition of quality of life as a pointer for health outcome result is attributed to the affectability of this measure for the evaluation of patient's health status after taken treatment and its health outcome. The purpose of the current study was to assess quality of life among a sample of Iraqi patients with rheumatoid arthritis and to determine the possible association between health’s related quality of life and some patient-certain factors. This study is a cross-sectional study carried out on 250 already diagnosed rheumatoid arthritis pat
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreImproving students’ use of argumentation is front and center in the increasing emphasis on scientific practice in K-12 Science and STEM programs. We explore the construct validity of scenario-based assessments of claim-evidence-reasoning (CER) and the structure of the CER construct with respect to a learning progression framework. We also seek to understand how middle school students progress. Establishing the purpose of an argument is a competency that a majority of middle school students meet, whereas quantitative reasoning is the most difficult, and the Rasch model indicates that the competencies form a unidimensional hierarchy of skills. We also find no evidence of differential item functioning between different scenarios, suggesting
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show More