Biosignal analysis is one of the most important topics that researchers have tried to develop during the last century to understand numerous human diseases. Electroencephalograms (EEGs) are one of the techniques which provides an electrical representation of biosignals that reflect changes in the activity of the human brain. Monitoring the levels of anesthesia is a very important subject, which has been proposed to avoid both patient awareness caused by inadequate dosage of anesthetic drugs and excessive use of anesthesia during surgery. This article reviews the bases of these techniques and their development within the last decades and provides a synopsis of the relevant methodologies and algorithms that are used to analyze EEG signals. In addition, it aims to present some of the physiological background of the EEG signal, developments in EEG signal processing, and the effective methods used to remove various types of noise. This review will hopefully increase efforts to develop methods that use EEG signals for determining and classifying the depth of anesthesia with a high data rate to produce a flexible and reliable detection device.
This study presents the results of atmospheric particulates sampling using high volume air sampler for selected places at Al Tuwaitha nuclear site. The collected samples were analyzed for gross alpha /beta radioactivity using Ludlum model 3030 and measurement particles activity in Al Tuwaitha nuclear site and the surrounding areas for the period from 28/12/2016 to 13/4/2017.The measurement of activity concentrations ranged from (0.42±0.03 to 4.18±0.13) Bq/m3 for alpha particles and from(0.93±0.06 to 9.21±0.26) Bq/m3for beta particles. The activity concentration of nuclides inversely proportional with air temperature and wind speed while humidity is directly proportional with it. Highest value of activity concentration has been found at(
... Show MoreThis paper is focused on studying the effect of cutting parameters (spindle speed, feed and depth of cut) on the response (temperature and tool life) during turning process. The inserts used in this study are carbide inserts coated with TiAlN (Titanum, Aluminium and Nitride) for machining a shaft of stainless steel 316L. Finite difference method was used to find the temperature distribution. The experimental results were done using infrared camera while the simulation process was performed using Matlab software package. The results showed that the maximum difference between the experimental and simulation results was equal to 19.3 , so, a good agreement between the experimental and simulation results was achieved. Tool life w
... Show MoreIn subterranean coal seam gas (CSG) reservoirs, massive amounts of small-sized coal fines are released during the production and development stages, especially during hydraulic fracturing stimulation. These coal fines inevitably cause mechanical pump failure and permeability damage due to aggregation and subsequent pore-throat blockage. This aggregation behavior is thus of key importance in CSG production and needs to be minimized. Consequently, such coal fines dispersions need to be stabilized, which can be achieved by the formulation of improved fracturing fluids. Here, we thus systematically investigated the effectiveness of two additives (ethanol, 0.5 wt % and SDBS, 0.001 and 0.01 wt %) on dispersion stability for a wide range of condit
... Show MoreEnglish
The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st
... Show MoreDEMs, thus, simply regular grids of elevation measurements over the land surface.The aim of the present work is to produce high resolution DEM for certain investigated region (i.e. Baghdad University Campus\ college of science). The easting and northing of 90 locations, including the ground-base and buildings of the studied area, have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from Quick-Bird satellite sensor (with spatial resolution of 0.6 m). It has been geo-referenced and rectified using 1st order polynomial transformation. many interpolation methods have been used to estimate the elevation such as ordinary Kriging, inverse distance weight
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreThe purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More