This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagnosis identification.
The design fabrics of the most important episodes that are at the core process rhetorical communication, until they became these episodes ample room for research and investigation, and the issue of non-familiar formality is nothing but the result of those relationships Constructivism, which is the result of an effort builders coherent activate the shape and attributes of phenotypic, therefore it will cause him a lot of questions about his and founded the organization in order to activate the speech communication between the product(cloth)and the receiver .On this basis, the research problem identified on imposing the question follows:1. Does the non-familiar formal role in enriching communication discourse of women's fabric designs?2. Ar
... Show MoreThe study aims budget in grades use of smart phones to individuals (sample) according variable sex (males and females) and used researcher descriptive analytical method consisted sample of (300) students have chosen the way stratified random, and the study variables (academic achievement of students, sex and the use of Smart phones) resolution was adopted as a tool for data collection. The most important results of the study that females are more commonly used for smart phones, as well as the existence of a positive relationship between the inverse statistically significant use of smart phones and the rate of school for students and the use of smart phones h
... Show MoreThe purposes of study are to measure the perceived competence and the locus of control among sixth-grade students, to identify the statistical differences between the perceived competence and the locus of control among sixth-grade students regarding the variable of gender, achievement, and economical status, and lastly, explore the correlation relationship between perceived competence and locus of control among sixth-grade students, To do this, the researchers have constructed two scales: one to measure the perceived competence based on bandura's theory (social-cognitive theory) which consisted of (26) items and the other to measure the locus of control based on Rotter's theory (social-learning theory) which included (25) items. The samp
... Show MoreThis study was designed to determine the colonization of the in-use hand washing soaps in hospital settings. It is a comparative cross-sectional research in a surgical specialties and Baghdad teaching hospital in Baghdad, Iraq. Swabs from surfaces of bar soaps and from liquid soaps via their applicator tips; at the sinks of toilets of hospital staff and working rooms of the wards were taken in January 2008. Conventional microbiologic methods were used for culture of the swabs and identification of the isolates. Colonization was detected 60% and 15.9% in bars and liquid forms respectively. And this lead to the conclusion that bar soaps could be colonized with microorganisms excessively. Liquid hand washing soaps are more appropriate in ho
... Show MoreFriction stir spot welding (FSSW) is a relatively new welding process that may have significant advantages compared to the fusion processes as follows joining of conventionally non-fusion weldable alloys, reduced distortion and improved mechanical properties of weldable alloys joints due to the pure solidstate joining of metals. In this paper, a three-dimensional model based on finite element analysis is used to study the thermal history in the spot-welding of aluminum alloy 2024. The model take place the thermomechanical property on the process of the welded metals. The thermal history and the evolution results with numerical model at the measured point in the friction stirred spot weld have a good matching, then the prediction of the t
... Show MoreVitamin E, having the well known antioxidant activity through scavenging free radicals و it occurs in several isomeric forms , these isomers have relatively different functions . One of these actions is related to its ability to inhibit platelets aggregation and hence thrombosis. The present study included a total number of apparently healthy 62 males . 11of them served as standard group , treated with 100 mg aspirin /day for more than one month . Another 31 subjects were randomly grouped into 5 groups that received different daily doses of α – tocopherol : 400 IU , 800 IU and 1200 IU for 2-6 months.The remainder ( 20 ) subjects served
... Show MoreReceipt date:10/27/2021 accepted date:12/15/2021 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreBulk polycrystalline samples have been prepared by the two-step solid state reaction process. It has been observed that as grown Tl2-xHgxSr2Ca2Cu3O10+δ (with x = 0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.8, 1) corresponds to the 2223 phase. It has been found that Tc varies with Hg content .The optimum Tc is about 120K for the composition Tl1.6Hg0.4Sr2Ca2Cu3O10+δ.The microstructure for Tl1.6Hg0.4Sr2Ca2Cu3O10+δ observed to be most dense and this phase exhibits the highest stability.