Preferred Language
Articles
/
alkej-601
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagnosis identification.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 09 2021
Journal Name
Journal Of Control, Automation And Electrical Systems
Design of an Adaptive Linear Quadratic Regulator for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Single-Phase Grid-Tied Transformerless Inverter of Zero Leakage Current for PV System
...Show More Authors

View Publication
Scopus (59)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of a Power System Transient Stability Using Static Synchronous Series Compensator SSSC
...Show More Authors

Static Synchronous Series Compensator (SSSC) is a well known device for effectively regulating the active power flow in a power system. In this paper, the SSSC linearized power flow equations are incorporated into Newton-Raphson algorithm in a MATLAB written program to investigate the control of active poweer flow and the transient stability of a five bus and a thirty bus IEEE test systems, during abnormal conduction (three phase fault near buses). A comparison of the results obtained for the base case without SSSC and with it to investigate the effectiveness of the device on both of the active power flow and the transient stability.

View Publication Preview PDF
Publication Date
Fri May 22 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effects of time delay and tension system application after final flask closure on the vertical displacement of acrylic and porcelain teeth in maxillary complete dentures
...Show More Authors

Background: The displacement of artificial teeth during complete denture construction presents major processing errors in the occlusal vertical dimension which were verified at the previous trial denture stage. The aim of this study was to assess the effect of delay in processing after final flask closure and tension application on the vertical acrylic and porcelain teeth displacement of complete dentures constructed from heat cured acrylic and the results were compared with the conventional processing method. Materials and methods: forty samples of identical maxillary complete dentures were constructed from heat polymerized acrylic resin. These samples were subdivided into the following experimental subgroups in which each subgroup contai

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
A Modified Fama-MacBeth Model based on the Single-Index Model
...Show More Authors

The aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth.  Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment.  Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
2018 9th International Conference On Information And Communication Systems (icics)
An intersection-based segment aware algorithm for geographic routing in VANETs
...Show More Authors

In networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
2019 11th Computer Science And Electronic Engineering (ceec)
ANN based Measurement for No-Reference Video Quality of Experience Metric
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication