Investigating gender differences based on emotional changes becomes essential to understand various human behaviors in our daily life. Ten students from the University of Vienna have been recruited by recording the electroencephalogram (EEG) dataset while watching four short emotional video clips (anger, happiness, sadness, and neutral) of audiovisual stimuli. In this study, conventional filter and wavelet (WT) denoising techniques were applied as a preprocessing stage and Hurst exponent
Background: It is important to achieve good glycemic control to avoid long-term diabetic complications. It has been largely debated about the role of correct way of insulin administration to get the desired glycemic control.
Objective: To evaluate the effect of teaching diabetic patients who are on insulin therapy the correct way of injecting insulin and its effect on glycemic control.
Methods: A non randomized clinical trial with 820 diabetic patients on insulin therapy on whom A1 c estimation was performed before and after three months of teaching them the right injection technique.
Results : Sixty seven patients (8.17%) had A1 c 6.5% before they were enrolled in the study while the majority (753 patents, 91.82%) had A1 c 6.5%
Abstract
Despite the fact of the importance and effectiveness of supporting the pricing policy for agriculture sector in Iraq, but this policy has stopped in supporting those agriculture production needs, and it was confined to support the final product only, and supporting the strategic corps exclusively after the U.S. Invasion in 2003, but after 2008 the state has returned to support some of this policy activities through providing financial loans through the agricultural initiative campaign, with trillions of iraqi dinars without any use, also providing support to some of the agricultural production needs such as fertilizers , tractors and agricultural combines, in addition supporting the pricing policy for the
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreIn this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A compari
Background: Measuring the concentration of hepatitis B surface antigen (HbsAg) in HBV patients can be determined with immunoassay techniques. This study aimed to measure the HbsAg titers in chronic HBV patients and to assess its correlation with patients' ages, gender, and with the levels of liver enzymes and total serum bilirubin. Materials and Method: Fifty-eight chronic hepatitis B infected patients were enrolled in this study. Age and gender of the patients were recorded. HbsAg concentration was tested with automated Immunoanalyzer. The patients were also tested for ALT, AST, ALP, and TSB by automated chemistry analyzer. Results: All the chronic HBV patients have positive HBsAg titers above the negative cutoff (0.05U/L) with mea
... Show MoreNew derivatives of pyromellitamic diacids and pyromellitdiimides have been prepared by the reaction of one mole of pyromellitic dianhydride with two moles of aromatic amines, these derivatives were characterized by elemental analysis, FT-IR and melting point.
The technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.The technological developments in the field of communication hav
... Show More