This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagnosis identification.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More
Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.
Research depend on quantitative and descriptive method, It
... Show MoreThe History of Multi Parties and its Effect on Political System in India
The research aims to analysis the future profits of companies listed on the Iraq Stock Exchange through analyzing the relationship between Actual Growth and Sustainable Growth, The study was applied to the sample of companies included in the Iraq Stock Exchange for the period (2010- 2014), The Internal Growth Rate has been used as a measure for the Actual Return Rate but the Sustainable Growth Rate has been measured under the Rose model, The research showed group of conclusions, the most important are:1. From the analysis of sustainable growth for the banks sample and the variables involved in its measure shows that investment in the investors amounts have achieved a significant return, which demonstrates the company's efficiency at gene
... Show MoreAbstract
This study investigates the mechanical compression properties of tin-lead and lead-free alloy spherical balls, using more than 500 samples to identify statistical variability in the properties in each alloy. Isothermal aging was done to study and compare the aging effect on the microstructure and properties.
The results showed significant elastic and plastic anisotropy of tin phase in lead-free tin based solder and that was compared with simulation using a Crystal Plasticity Finite Element (CPEF) method that has the anisotropy of Sn installed. The results and experiments were in good agreement, indicating the range of values expected with anisotropic properties.
Keywords<
... Show Moreأهمية البحث والحاجة إليه:
من مظاهر التواصل الحضاري في جانبه العلمي والتكنولوجي هو متابعة أبناء مجتمعنا ولاسيما الشباب لكل منجز حديث واتخاذه وسيلة للحصول على المعلومات والمعرفة والتسلية، بحيث أصبح هذا التعامل ممارسة يومية حياتية، وهذا دليل على مدى تفتح ذهنية وعقلية ورغبات أبنائنا ومواكبتهم لروح العصر ومتطلباته وتعبيراً صادقاً عنه فضلاً عن إشغال أوقات ف
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More