Preferred Language
Articles
/
alkej-601
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagnosis identification.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Results In Engineering
Stability analysis for the phytoplankton-zooplankton model with depletion of dissolved oxygen and strong Allee effects
...Show More Authors

View Publication Preview PDF
Scopus (22)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Cyber Crime and its Risks on Children
...Show More Authors

Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تحليل العوامل المؤثرة في اداء سوق الاوراق المالية(مصر حالة دراسية)
...Show More Authors

تشكل سوق الاوراق المالية ركناً اساسياً من اركان هيكل النظام التمويلي في النظم الاقتصادية المعاصرة، لما تقوم به هذه الاسواق من دور مهم في حشد المدخرات المحلية وتوجيهها في قنوات استثمارية تعمل على دعم الاقتصاد القومي وتزيد من معدلات الرفاهية الاقتصادية لافراده، فضلاً عن كونها مرأة للوضع الاقتصادي العام في البلاد.

ونتيجة للروابط القوية بين سوق الاوراق المالية والاقتصاد، عُدّ استقرار ونمو

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
مجلة لارك جامعة
تحليل الأخطاء النحوية في التواصل الكتابي لدارسي اللغة الاسبانية في العراق
...Show More Authors

تحليل الأخطاء النحوية في التواصل الكتابي لدارسي اللغة الاسبانية في العراق

Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
LA LITTÉRATURE RÉDUCTIBLE Analyse critique de l’exploitation du texte littéraire dans Le « Mauger Bleu »
...Show More Authors

RÉSUMÉ                                                    

            LeMauger Bleu est une méthode emblématique de l’enseignement traditionnel, qui présente une littérature française riche et patrimoniale, et dont l’objectif est de faciliter l’accès au texte par le vocabulaire et la grammaire et d’étendre la culture générale et littéraire de l’apprenant. La démarche (traditionnelle) est toujours la même : le texte, le vocabulaire et la grammaire, la traduct

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Tue Feb 01 2011
Journal Name
Iop Conference Series: Materials Science And Engineering
Contour extraction of echocardiographic images based on pre-processing
...Show More Authors

In this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors