Preferred Language
Articles
/
alkej-511
Finite Element Based Solution of Laplace's Equation Applied to Electrical Activity of the Human Body
...Show More Authors

Computer models are used in the study of electrocardiography to provide insight into physiological phenomena that are difficult to measure in the lab or in a clinical environment.

The electrocardiogram is an important tool for the clinician in that it changes characteristically in a number of pathological conditions. Many illnesses can be detected by this measurement. By simulating the electrical activity of the heart one obtains a quantitative relationship between the electrocardiogram and different anomalies.

Because of the inhomogeneous fibrous structure of the heart and the irregular geometries of the body, finite element method is used for studying the electrical properties of the heart.

This work describes the implementation of the Conjugate Gradient iterative method for the solution of large linear equation systems resulting from the finite element method. A diagonal Jacobi preconditioner is used in order to accelerate the convergence. Gaussian elimination is also implemented and compared with the Precondition Conjugate Gradient (PCG) method and with the iterative method. Different types of matrix storage schemes are implemented such as the Compressed Sparse Row (CSR) to achieve better performance. In order to demonstrate the validity of the finite element analysis, the technique is adopted to solve Laplace's equation that describes the electrical activity of the human body with Dirichlet and Neumann boundary conditions. An automatic mesh generator is built using C++ programming language.  Initially a complete finite element program is built to solve Laplace's equation. The same accuracy is obtained using these methods. The results show that the CSR format reduces computation time compared to the order format. The PCG method is better for the solution of large linear system (sparse matrices) than the Gaussian Elimination and back substitution method, while Gaussian elimination is better than iterative method.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
2016 8th Computer Science And Electronic Engineering (ceec)
Utilisation of multipath phenomenon to improve the performance of BCH and RS codes
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Oct 03 2023
Journal Name
Biomedical And Pharmacology Journal
The Significance of Remdesivir and Favipiravir Therapies to Survival of COVID-19 Patients
...Show More Authors

The coronavirus disease 2019 (COVID-19) pandemic and the infection escalation around the globe encourage the implementation of the global protocol for standard care patients aiming to cease the infection spread. Evaluating the potency of these therapy courses has drawn particular attention in health practice. This observational study aimed to assess the efficacy of Remdesivir and Favipiravir drugs compared to the standard care patients in COVID-19 confirmed patients. One hundred twenty-seven patients showed the disease at different stages, and one hundred and fifty patients received only standard care as a control group were included in this study. Patients under the Remdesivir therapy protocol were (62.20%); meanwhile, there (30.71

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jun 28 2025
Journal Name
Journal Of Sport Sciences
Relationship of some components of blood immune fast transition to the handball players
...Show More Authors

It research and descriptive sample of players Handball number (21) player (Club Husseiniya) The research aims to identify the relationship between certain components of blood and immunological speed the transition has been a test speed the transition in addition to the withdrawal of a blood sample after (5-10) minutes on the test to identify the nature of the correlation between speed and some transitional immune blood Mkonaght. The importance of research in identifying the relationship element speed in the game where one of the key elements in this game and some blood components immune where there is little of the studies, which focused on the nature of the relationship between exercise and immune blood, especially in a game of handball, e

... Show More
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
THE EXTENT OF EXPOSURE OF BAGHDAD UNIVERSITY : (Students To Cultural And Television Programs)
...Show More Authors

Communication is one of the main elements of culture, it is the source of its formation and a factor of its development and spread. Communication is a 'dynamic' cultural process and is an integral part of the political, social, economic and cultural aspects of people. Therefore, mass communication means help in the course and movement of individuals and cultural communities. The relationship between media and culture according to this perspective is one of many key factors and influential forces that make it coherent and sometimes intertwined. It is a problematic relationship that leads to research and study in order to lay the right foundations in the orientation towards the audience.

Mass communication has many basic functions.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Audio Classification Based on Content Features
...Show More Authors

Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref