Preferred Language
Articles
/
alkej-640
Wearable Detection Systems for Epileptic Seizure: A review
...Show More Authors

The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.

Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.

The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple body signals, new algorithm methods, and detection devices that are commercially available.

As a result, the reviewing process shows that there are many research articles that have covered wearable seizure detection systems that based on body signals. The more effective monitoring and detection seizure system is the system that uses multi-body signals, is highly comfortable and has low power consumption.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
A Prevalence study of Entamoeba spp. in Basrah Province using Different Detection Methods
...Show More Authors

This study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
American Journal Of Biodiversity
Importance of Conventional Pap Smear Application for Iraqi women health: scientific review
...Show More Authors

A Pap test can identify the pre-cancerous and cancerous problem in the vagina and uterine cervix. Cervical tumour is the easiest gynecologic disease to be diagnosed, treated and prevented using regular screening tests and follow-up. This review aimed to explore the opinion of specialists about cytological changes and the precancerous lesions with Pap smear test and visual inspection of the cervices, also to determine the relationship of this malignancy with demographic characteristics of patients. Results showed that few cervical cancer and pre-cancer were with women in postmenopausal period, but more were with women in the premenopausal period. Visual inspection of the cervix can show erosion lesions by gross inspection. Upon cytology exam

... Show More
View Publication
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Pharm. Sci. & Res.
Review and Description for Theretra alecto Boisduval 1827, (Lepidoptera: Sphingidae) in Iraq
...Show More Authors

The current study included a review of the registration and description of the Theretra alecto Boi, 1827 (Levant hawk moth), samples were collected from various areas of the Baghdad belt and the provinces of the Middle Euphrates, confirmation in the description was on the most important parts of the body included the head and it's appendages, pronotum, wings as well as male and female genitalia. The morphological characteristics under study were enhanced by illustrations and images. Information on the locations and date of the collection was also confirmed. This study aims to identify the most important characteristics of the diagnosis of the species and the review of appearance variations, especially the analytical style of wings, coupling

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Surgical Neurology International
Brown-Sequard syndrome associated with a spinal cord injury caused by a retained screwdriver: A case report and literature review
...Show More Authors
Background:

Nonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.

Methods:

PubMed database was searched by the following combined formula of medical subjects headings,

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
In Situ Hybridization for Molecular Detection of Human Papilloma Viral 6 / 11 DNA in Adenoctomized Tissues from A group of Iraqi Pediatric Patients
...Show More Authors

Among more than 200 different human papilloma viral genotypes, the association of low oncogenic risk-HPV genotypes have been recognized with a variety of oral, oropharyngeal, nasopharyngeal benign tumors as well as non-neoplastic polyposis and papillomas and adenoid hypertrophy. This prospective case- control study aims to determine the rate of DNA detection of HPV genotype 6/11 in nasopharyngeal adeno- tonsillar tissues from a group of patients subjected to adenoctomy for adenoid hypertrophy . A total number of nasopharyngeal adeno-tonsillar tissue specimens from pediatric patients with adenoid hypertrophy were enrolled; 40 nasopharyngeal adeno-tonsillar tissues from patients with adenoid hypertrophy, and 20 normal nasal tissue specimen

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Computers & Electrical Engineering
Utilizing different types of deep learning models for classification of series arc in photovoltaics systems
...Show More Authors

View Publication
Crossref (6)
Crossref