Recently, the development of the field of biomedical engineering has led to a renewed interest in detection of several events. In this paper a new approach used to detect specific parameter and relations between three biomedical signals that used in clinical diagnosis. These include the phonocardiography (PCG), electrocardiography (ECG) and photoplethysmography (PPG) or sometimes it called the carotid pulse related to the position of electrode.
Comparisons between three cases (two normal cases and one abnormal case) are used to indicate the delay that may occurred due to the deficiency of the cardiac muscle or valve in an abnormal case.
The results shown that S1 and S2, first and second sound of the
... Show MoreThe research topic (The dramatic structure transformations in the Iraqi Feature Film) studies the dramatic structure and its transformations in the Iraqi feature film. The research determined the research problem and the need for it in addition to the aims and the limits of the study as well as its importance. The theoretical framework consists of the following themes: the dramatic transformations mechanism and dramatic data in the Iraq film 1957-2003 then the dramatic values transformations and the performance contradictions in the Iraqi film.
The research, after concluding the theoretical framework, came up with a number of indicators of the theoretical framework that have been used as a tool to analyze the sample. The research proc
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreSurface electromyography (sEMG) and accelerometer (Acc) signals play crucial roles in controlling prosthetic and upper limb orthotic devices, as well as in assessing electrical muscle activity for various biomedical engineering and rehabilitation applications. In this study, an advanced discrimination system is proposed for the identification of seven distinct shoulder girdle motions, aimed at improving prosthesis control. Feature extraction from Time-Dependent Power Spectrum Descriptors (TDPSD) is employed to enhance motion recognition. Subsequently, the Spectral Regression (SR) method is utilized to reduce the dimensionality of the extracted features. A comparative analysis is conducted between the Linear Discriminant Analysis (LDA) class
... Show MoreThe Main think that be kept by the speech communication as a concept traditionally being expressed on the subject or a certain idea of a goal came on as needed functional addressed to recipients of benefits or likely to benefit from those rhetorical message through a speech importance and priority of the effect of not less than the effect of that letter, in science content role ends once you absorb it mentally, either in the art of design Valamadmon intellectual embodied through its interaction with the overall shape of the finished design, and often content is associated in the mind of the receiver through a letter communicative linked to the sense or the goal that meant the designer, and try to identify and explain. And meaning i
... Show MoreBN Rashid…, Special Education, 2022
This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More