This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagnosis identification.
The problems of modeling the signal and dispersion properties of a second order recursive section in the integer parameter space are considered. The formulation and solution of the section synthesis problem by selective and dispersive criteria using the methods of integer nonlinear mathematical programming are given. The availability of obtaining both positive and negative frequency dispersion of a signal in a recursive section, as well as the possibility of minimizing dispersion distortions in the system, is shown.
الأهمية :
التخطيط بالمعنى العام مارسته بعض الجماعات ، وكثير من الأفراد عبر العصور فهم حاولوا أو يحاولون التحكم في مستقبل حياتهم أو حياة أبنائهم ، وقد حدثنا التأريخ عن بعض التجارب لمواجهة الأزمات والكوارث التي هددت بعض الشعوب ، ولعل قضية سيدنا يوسف عليه السلام وهي تشير الى خطته لمواجهة المجاعة المنتظرة ، ومقوماتها حسن التخزين وضبط الأستهلاك وفترتها الزمنية ، فضلاً عن أمثلة تاريخية لموا
... Show MoreAbstract
This study investigates the mechanical compression properties of tin-lead and lead-free alloy spherical balls, using more than 500 samples to identify statistical variability in the properties in each alloy. Isothermal aging was done to study and compare the aging effect on the microstructure and properties.
The results showed significant elastic and plastic anisotropy of tin phase in lead-free tin based solder and that was compared with simulation using a Crystal Plasticity Finite Element (CPEF) method that has the anisotropy of Sn installed. The results and experiments were in good agreement, indicating the range of values expected with anisotropic properties.
Keywords<
... Show MoreThe present paper aims at investigating the linguistic image portrayed by UNICEF reports on the Iraqi child from a critical discourse analysis perspective during Covid19 pandemic (2020). The paper attempts to fill a gap in research literature concerning the linguistic construction of the Iraqi child by the UNICEF reports during the critical health crisis of Covid19. Van Leeuwen’s (2008) approach of social actor representation has been adopted for this purpose. From Van Leeuwen’s approach, the category of determination (single determination and overdetermination) has been selected to be the main analytical tool for its high compatibility with the set of objectives put forward to figure out how such a globally effective and
... Show Moreتعد الموازنة الأداة الأساسية لتنفيذ أولويات أية دولة، ويتوجب النظر إليها في ضوء المناخ الاجتماعي والسياسي والاقتصادي، لأنها تساعد في توجيه الاقتصاد لتحقيق النمو ورفع مستوى الرفاهية. اعتمدت وزارة المالية في أعداد الموازنة السنوية بعد 9/4/ 2003 أسلوباً مغايراً لما كان معتمداً في العقود الماضية، إذ كانت هناك موازنتين الأولى الموازنة الجارية، والثانية الموازنة الاستثمارية رغم وجود قانون يحتم إصدار موازنة
... Show More
Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.
Research depend on quantitative and descriptive method, It
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (