Preferred Language
Articles
/
alkej-640
Wearable Detection Systems for Epileptic Seizure: A review
...Show More Authors

The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.

Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.

The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple body signals, new algorithm methods, and detection devices that are commercially available.

As a result, the reviewing process shows that there are many research articles that have covered wearable seizure detection systems that based on body signals. The more effective monitoring and detection seizure system is the system that uses multi-body signals, is highly comfortable and has low power consumption.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 15 2025
Journal Name
Iraqi Journal Of Laser
Performance Enhancement of Metasurface Grating Polarizer Using Deep Learning for Quantum Key Distribution Systems
...Show More Authors

Metasurface polarizers are essential optical components in modern integrated optics and play a vital role in many optical applications including Quantum Key Distribution systems in quantum cryptography. However, inverse design of metasurface polarizers with high efficiency depends on the proper prediction of structural dimensions based on required optical response. Deep learning neural networks can efficiently help in the inverse design process, minimizing both time and simulation resources requirements, while better results can be achieved compared to traditional optimization methods. Hereby, utilizing the COMSOL Multiphysics Surrogate model and deep neural networks to design a metasurface grating structure with high extinction rat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Design and implementation of silicon single-photon avalanche photodiode modeling tool for QKD systems
...Show More Authors

Single-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant perform

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Semiparametric Bayesian Method with Classical Method for Estimating Systems Reliability using Simulation Procedure
...Show More Authors

               In this research, the semiparametric Bayesian method is compared with the classical  method to  estimate reliability function of three  systems :  k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Mar 26 2024
Journal Name
World Electric Vehicle Journal
Fast Finite-Time Composite Controller for Vehicle Steer-by-Wire Systems with Communication Delays
...Show More Authors

The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var

... Show More
View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Mar 25 2024
Journal Name
Biomedical And Pharmacology Journal
A Summary of the Pharmacological Activity, Phytochemistry and Pharmacognosy of Parthenocissus quinquefolia (L.): A Review
...Show More Authors

Historically, medicinal herbs have been utilized as an important origin of chemicals with particular therapeutic potentials, and they continue to be a great place to find new medication candidates. Parthenocissus quinquefolia L. is a member of the grape-growing family Vitaceae. It is indigenous to Central and North America. It is widely dispersed in Iraqi gardens and plant houses from north to south. Traditionally, it has many uses, like relieving constipation, treating jaundice, expectorant, emetic, and others. At the same time, its proven activities include antioxidant activity, antimicrobial, anti-diabetic, thrombin inhibitor effect, and medicine for treating eyelid eczema. Parthenocissus quinquefolia contains valuable phytochemicals lik

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
A Review of Modern Methods of Synthesis 1, 3, 4-Oxadiazole as a Bioactive Compounds
...Show More Authors

ABSTRACT: Oxadiazole ring is a heterocyclic molecule with an oxygen and two nitrogen atoms spread throughout its five-membered structure. There are four different isomers that have been discovered, Because of their wide applications in a range of sectors, including medications . Some of these biological activity are; anticonvulsant capacity, anticancer as well, antibacterial, antiviral, antifungal,  antimalarial, antitubercular, anti-asthmatic, antidepressant, antidiabetic, antioxidant, antiparkinsonian, analgesic and  anti-inflammatory, are just some of the therapeutic uses that have drawn attention to drug candidates containing an oxadiazole moiety. This review, we will examine the various methods of oxadiazole synthesis. The mo

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
A Prevalence study of Entamoeba spp. in Basrah Province using Different Detection Methods
...Show More Authors

This study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref