Background: Unlike normal EEG patterns, the epileptiform abnormal pattern is characterized by different mor phologies such as the high-frequency oscillations (HFOs) of ripples on spikes, spikes and waves, continuous and sporadic spikes, and ploy2 spikes. Several studies have reported that HFOs can be novel biomarkers in human epilepsy study. S) Method: To regenerate and investigate these patterns, we have proposed three large scale brain network models (BNM by linking the neural mass model (NMM) of Stefanescu-Jirsa 2D (S-J 2D) with our own structural con nectivity derived from the realistic biological data, so called, large-scale connectivity connectome. These models include multiple network connectivity of brain regions at different lobes from both hemispheres (left and right). The network nodes of these models were simulated based on the local dynamics of the S-J 2D model, which were generated by adjusting the global coupling between the excitatory and inhibitory populations. The connection strength between the inhibitory and excitatory neurons of the local model was also adjusted to investigate different morphology patterns. Results: The proposed network models were developed and evaluated by simulations. Different abnormal patterns of EEG brain activities such as HFO S ripples on spikes, spikes, continuous spikes, sporadic spikes and ploy2 spikes ranging from 94 to 144 Hz were regenerated. Different morphology patterns of abnormality were generated from novel BNMs and the epileptiform abnormal pattern obtained in actual EEG and other computational models were also compared. Significant: This study is able to assist researchers and clinical doctors in the field of epilepsy to better understand the complex neural mechanisms behind the abnormal oscillatory activities, which may lead to the discovery of new clinical interventions in epilepsy.
In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe increase globally fossil fuel consumption as it represents the main source of energy around the world, and the sources of heavy oil more than light, different techniques were used to reduce the viscosity and increase mobility of heavy crude oil. this study focusing on the experimental tests and modeling with Back Feed Forward Artificial Neural Network (BFF-ANN) of the dilution technique to reduce a heavy oil viscosity that was collected from the south- Iraq oil fields using organic solvents, organic diluents with different weight percentage (5, 10 and 20 wt.% ) of (n-heptane, toluene, and a mixture of different ratio
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreSoils encounter cyclic loading conditions in situ, for example during the earthquakes and in the construction sequences of pavements. Investigations on the local scale displacements of the soil grain and their failure patterns under the cyclic loading conditions are relatively scarce in the literature. In this study, the local displacement fields of a dense sand layer interacting with a rigid footing under the plane-strain condition are examined using both experiments and simulations. Three commonly used types of cyclic loading conditions were applied on the footing. Digital particle image velocimetry (DPIV) is used to measure the local scale displacement fields in the soil, and to understand the ev
The current study aimed to standardize the multi-position suicidal tendency scale MAST in the Saudi environment as well as to assess suicidal tendencies in adolescents. Moreover, the study aimed to test the psychometric characteristics of the scale among a sample of (490) high school and undergraduate students, in the adolescence who ranging in age from (16-21) years. The scale demonstrated satisfactory internal consistency in terms of validity and reliability tests. as the results showed of exploratory factor analysis to the four dimensions of suicidal tendencies loading on two factors that accommodate 74.60% of the overall variance of the scale (1) the attitude toward life, and absorbs 43, 20% of the total variance of the scale,
... Show MoreAdvanced strategies for production forecasting, operational optimization, and decision-making enhancement have been employed through reservoir management and machine learning (ML) techniques. A hybrid model is established to predict future gas output in a gas reservoir through historical production data, including reservoir pressure, cumulative gas production, and cumulative water production for 67 months. The procedure starts with data preprocessing and applies seasonal exponential smoothing (SES) to capture seasonality and trends in production data, while an Artificial Neural Network (ANN) captures complicated spatiotemporal connections. The history replication in the models is quantified for accuracy through metric keys such as m
... Show MoreIn this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show More