Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreBackground: left ventricular hypertrophy is independent risk factor for cardiovascular morbidity and mortality. The presence of diabetic complications such as autonomic neuropathy and retinopathy may predict cardiac structural changes in diabetic patients. Objective: To explore the chance of occurrence of left ventricular hypertrophy in diabetic patients and whether it is related to the presence of other diabetic complications. Methods: ninty seven (97) normotensive diabetic patients (57) type II with mean duration of diabetes of (12±6 y) and forty (40) type I with mean duration of (8±6 y) were studied by echocardiography and compared with 41 patients as control. Results: The LVMI was significantly higher in type II diabetics compared
... Show MoreIn a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u
... Show MoreOur dear country faces many and varied challenges aimed at its history, civilization, its people, the scourge of drugs and psychotropic substances and their misuse. Therefore, we have a historical, ethical and professional responsibility to coordinate efforts and cooperation between all concerned to protect the Iraqi society from the threat of this scourge. Creative sources have varied in the variety of expressive means in politics, literature and the arts, in their style and technical treatment of various topics with innovative manifestations and intuitive interactive with visions as well as influences Psychological expressive descriptions of visual scene, it is one of the media and propaganda that contribute to the raising and developm
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBackground: Oral squamous cell carcinoma (OSCC) is a common malignancy characterized by poor prognosis and low survival rate. The purpose of this study was to evaluate the Immunohistochemical expressions of BAD, MDM2, and P21as apoptotic markers in oral squamous cell carcinoma. Materials and methods: This study was performed on forty formalin-fixed paraffin-embedded blocks which histopathologically diagnosed as Oral Squamous Cell Carcinoma. All cases were collected from the Histopathological Laboratory from patients treated surgically at Maxillofacial surgery Department at Ramadi Teaching Hospital, Iraq. Results: The immunohistochemical staining of BAD showed positive expression in 39 (97.5%), MDM2 showed positive expression in 39(97.5%)
... Show MoreDBN Rashid, International Journal of English Linguistics, 2019 - Cited by 2