It is widely accepted that early diagnosis of Alzheimer's disease (AD) makes it possible for patients to gain access to appropriate health care services and would facilitate the development of new therapies. AD starts many years before its clinical manifestations and a biomarker that provides a measure of changes in the brain in this period would be useful for early diagnosis of AD. Given the rapid increase in the number of older people suffering from AD, there is a need for an accurate, low-cost and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, the electroencephalogram (EEG) can play a vital role in this but at present, no reliable EEG biomarker exists for early diagnosis of AD. The gradual slowing of brain activity caused by AD starts from the back of the brain and spreads out towards other parts. Consequently, determining the brain regions that are first affected by AD may be useful in its early diagnosis. Higuchi fractal dimension (HFD) has characteristics which make it suited to capturing region-specific neural changes due to AD. The aim of this study is to investigate the potential of HFD of the EEG as a biomarker which is associated with the brain region first affected by AD. Mean HFD value was calculated for all channels of EEG signals recorded from 52 subjects (20-AD and 32-normal). Then, p-values were calculated between the two groups (AD and normal) to detect EEG channels that have a significant association with AD. k-nearest neighbor (KNN) algorithm was used to compute the distance between AD patients and normal subjects in the classification. Our results show that AD patients have significantly lower HFD values in the parietal areas. HFD values for channels in these areas were used to discriminate between AD and normal subjects with a sensitivity and specificity values of 100% and 80%, respectively.
It is found in the book "Ibn Aqeel: Alfiya Ibn Malek" that there are some linqustical aspected are related to the native tribal speakers like Tamim or Tie or some others. Sometimes in the book he said "some Arabian said without mentioning the name of the tribe.
As weel, he hasn’t mentioned the accent but he does mention the language. In the book, he has brought back the most important and the biqqest Arabian tribes suchas tribes of Hegaz, Tamim, Hatheyal, son of Anber, Tie, Rabia Bin Wael, Bani Katham, Au there, Bani AL Harth, Bani Kalb, Bani Hgim, Zabid, Hamedan, Alia Qais, Bani Ameer and many others. However, the most mentioned tribes were Hegaz and Tami.
Hence, the importance of the book expiain Ibn Aqeel by mentioning these A
Self-Assertion is the individual ability to express any emotion well, except the anxiety. The decrease of the individuals asserting behavior makes them face many difficulties that prevent their social adjustment. Moreover it reflexes many negative behavioral and physical cases. The individual, who fails to express his or her negative feelings in required situations, feels with dissatisfaction, loneliness, depression, anxiety, social anxiety, conflict, and psychological disorder.
Accordingly, the importance of this study is represented in studying the self-assertion and studying the university students who reflect the strength of society.
The following are the two aims of the study:
1. Construct an asserting behavior scale.
2.
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreBy definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values
The research tagged with the controversy of aesthetic interpretation between the sculptures and their titles in contemporary Iraqi sculpture, “Exhibition of Experiments in Contemporary Iraqi Sculpture as a Model”, and it is one of the new research that contributes to strengthening the critical path in the Iraqi fine movement, as the first chapter dealt with the research problem stemming from the question: What is the impact of the aesthetic hermeneutic controversy between the title and the title in contemporary Iraqi sculpture?, and do the titles of the sculptural works help to understand or enhance their contents?, The research objective included: To identify the controversy of the aesthetic interpretation of sculptures and their ti
... Show MoreZernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show More