Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopting a combination of Singular Value Decomposition (SVD), and Discrete Wavelet Transform (DWT). The combination of these two signal processing techniques is gaining lots of interest in the field of speaker and speech recognition. As a cough recognition approach, we found it well-performing, as it generates and utilizes an efficient minimum number of features. Mean and median frequencies, which are known to be the most useful features in the frequency domain, are applied to generate an effective statistical measure to compare the results. The hybrid structure of DWT and SVD, adopted in this approach adds to its efficiency, where a 200 times reduction, in terms of the number of operations, is achieved. Despite the fact that symptoms of the infected and non-infected people used in the study are having lots of similarities, diagnosis results obtained from the application of the proposed approach show high diagnosis rate, which is proved through the matching with relevant PCR tests. The proposed approach is open for more improvements with its performance further assured by enlarging the dataset, while including healthy people.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreEach school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Steel-concrete-steel (SCS) structural element solutions are rising due to their advantages over conventional reinforced concrete in terms of cost and strength. The impact of SCS sections with various core materials on the structural performance of composites has not yet been fully explored experimentally, and in this work, both slag and polypropylene fibers were incorporated in producing eco-friendly steel-concrete-steel composite sections. This study examined the ductility, ultimate strength, failure modes, and energy absorption capacities of steel-concrete-steel filled with eco-friendly concrete, enhanced by polypropylene fiber (PPF) to understand its impact on modern structural projects. Eco-friendly concrete was produced by the partial
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreThis study examines the analysis of the contents of the international public relations campaign in confronting the Covid-19 virus, which was taken from the (Your Health is a Trust) campaign for the World Health Organization, Iraq office.The research problem revolves around a main question that is, what are the axes of the campaign (Your Health is a Trust) established by the World Health Organization (Iraq office) in the prevention of Covid 19 virus?From this main question, several sub-questions emerged that this study answered on their Facebook page, and the communication activities of the Covid-19 awareness campaign. In the content analysis form, as this form included a number of main themes and main categoriesthat were adopted in analyzin
... Show MoreThe present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show More