Preferred Language
Articles
/
pRf8Po8BVTCNdQwC5mUI
Preparing of ECG Dataset for Biometric ID Identification with Creative Techniques
...Show More Authors

The Electrocardiogram records the heart's electrical signals. It is a practice; a painless diagnostic procedure used to rapidly diagnose and monitor heart problems. The ECG is an easy, noninvasive method for diagnosing various common heart conditions. Due to its unique advantages that other humans do not share, in addition to the fact that the heart's electrical activity may be easily detected from the body's surface, security is another area of concern. On this basis, it has become apparent that there are essential steps of pre-processing to deal with data of an electrical nature, signals, and prepare them for use in Biometric systems. Since it depends on the structure and function of the heart, it can be utilized as a biometric attribute for identification and recognition. This academic paper presents a new data formatting technique to be used in biometric systems based on the two major dataset kinds, PTB and PTB-XL.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Identification of the main causes of risks in engineering procurement construction projects
...Show More Authors
Abstract<p>Many risks have adverse consequences for construction projects’ objectives such as quality, schedule, and cost. As engineering procurement construction (EPC) contracts gradually become one of the most common types used in implementing major large-scale construction projects, identifying common risk types and analyzing their root causes is important for developing measures to decrease and eliminate future risks in these types of contracts. The information about the main causes of risks was collected <italic>via</italic> well-structured questionnaires addressed to construction sector professionals and preparing lists of main potential risks in EPC/construction projects throu</p> ... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
World Journal Of Pharmaceutical Research
IDENTIFICATION OF SOME SPECIES OF WIREWORM AGRIOTES SPP. (COLEOPTERA: ELATERIDAE) IN BAGHDAD
...Show More Authors

Publication Date
Wed Mar 16 2016
Journal Name
World Journal Of Pharmaceutical Research
Identification of some species of wireworm Agriotes spp.(Coleoptera: Elateridae) in Baghdad
...Show More Authors

Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Synthesis and Identification of Some New Derivative of Trimethoprim and Paracetemol Drugs
...Show More Authors

In this research two series of the new derivatives of Trimethoprim and paracetamol drugs have been prepared which known as a high medicinal effectiveness. Series (A) is including the interaction of diazonium salt of trimethoprim and coupling with some substituted phenol compounds (2-amino phenol, 3-ethyl phenol, 1-naphthol, 2-nitro phenol, Salbutamol). Series (B) is including the interaction coupling alkali solution of paracetamol with diazonium salt of some substituted aniline compounds (Benzedine, 2, 3-di chloro aniline, Trimethoprim, Anilinium chloride, 2-nitro- 4-chloro aniline).Chemical structures of all synthesized compounds were confirmed by UV-visible and FTIR spectroscopy.

View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Monitoring the land surface temperature for Al-Ahdab oil field in 2022 using R.S and GIS techniques
...Show More Authors
Abstract<p>The skin temperature of the earth’s surface is referred to as the Land Surface Temperature (LST). the availability of long-term and high-quality temperature records is important for various uses that affect people’s lives and livelihoods. Much valid information was provided to this research from remote sensing technology by using Landsat 8 (L8) imagery to estimate LST for Al-Ahdab oil field in Wasit city in Iraq. The aim of this research is to analyze LST variations based on Landsat 8 data for 2022 (January, April, July, and October). ArcMap 10.8 was used to estimate LST results. The results values ranged from (about 10 C in January to about 46 C in July). The results show that LS</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The effectiveness of teaching the theory of TRIZ in expressive performance and the development of creative thinking among preparatory school students
...Show More Authors

The current research aims to find out (the effectiveness of teaching TRIZ theory in the expressive performance and the development of creative thinking among preparatory school students)
To achieve this, the researcher adopted on an experimental design is located in women with partial seizure experimental designs field in order to achieve the goals of the research, has sample consisted of two divisions seminars Mentzmtin in junior high school Diyala for Boys, and divided the sample of (60) called on the two groups, the first pilot of ( 30) student, and the other officer and number (30), student, and studied researchers experimental group theory TRIZ, while he studied the officer in the traditional manner, the researcher conducted a pa

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Kufa Journal For Nursing Sciences
Effectiveness of Simulation Techniques on the Nursing Students Knowledge toward Cardiopulmonary Resuscitation for Adults at College of Nursing/University of Baghdad
...Show More Authors

MM Abdulwahhab, kufa Journal for Nursing sciences, 2017 - Cited by 1

View Publication Preview PDF
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
New techniques to estimate the solution of autonomous system
...Show More Authors

This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref