The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this disease in children. Generally, this study aims to provide an evident of a reliable biomarker to detect epilepsy in children to give them an additional chance to live a high quality life.
Abstract
Magnetic abrasive finishing (MAF) is one of the advanced finishing processes, which produces a high level of surface quality and is primarily controlled by a magnetic field. This paper study the effect of the magnetic abrasive finishing system on the material removal rate (MRR) and surface roughness (Ra) in terms of magnetic abrasive finishing system for eight of input parameters, and three levels according to Taguchi array (L27) and using the regression model to analysis the output (results). These parameters are the (Poles geometry angle, Gap between the two magnetic poles, Grain size powder, Doze of the ferromagnetic abrasive powder, DC current, Workpiece velocity, Magnetic poles velocity, and Finishi
... Show MoreConclusion :
The conflict between the fundamentalist and news theory in the methodology that each of the two schools pursued with the Twelver Shi'a Imamiyyah in deriving the legal rulings from the sources of legislation, especially in the second source, which is the noble hadith and narration after the Holy Qur’an, which is the first source has gone through multiple and complex stages that led This struggle to excess, stress, exaggeration, negligence, neglect and indulgence by each of the two schools in dealing with the noble hadith and narration and in the manufacture of rules and laws and fundamentalist and juristic theories of the process of jurisprudential development of legal rulings where every school believed and proceed
... Show MoreAmong Persian poets and literary works, Ferdowsi and Shahnameh have a distinctive and prominent place. Since the 5th C. AH , they took the interest of all Persian language and literature scholars and were one of the first books to be translated into different languages including Arabic by Al Fatih Bin Ali Bin Mohammed Al-Bandari in the year of (620)AH .Because it was completed in the early 7th C. AH and in terms of antiquity, there is no older copy than of Al-Bandari’s version which holds great value in the analysis of Shahnameh other different copies.
To find out the how far analogy goes, the present paper makes a general comparisons of Bijan and Manijeh in Shahnameh Fer
... Show MoreBackground: Malignant lymphoma is a term that describes primary tumors of the lymphoreticular system, almost all of which arise from lymphocytes.MMP-1 is the most ubiquitously expressed interstitial collagenase, a subfamily of MMPs that cleaves stromal collagens. It is also called collagenase-1.TIMPs which inhibits MMP activity and thereby restrict extracellular matrix breakdown, TIMP-1 is a stromal factor that has a wide spectrum of functions in different tissues. Material and Methods: This study was performed on (68) formalin-fixed, paraffin-embedded blocks, histopathologically diagnosed as lymphoma (head and neck lesions). Immunohistochemical staining of MMP1and TIMP1 was performed on each case of the study sample. Results: The expressio
... Show MoreObjective(s): To assess mothers’ knowledge about their children with sickle cell anemia and non-Pharmacological approaches to pain management and found some relationship between mothers knowledge and their demographic data of age, level of education, and occupation.
Methodology: A descriptive design used in the present study established was for a period from September 19th, 2020 to March 30th, 2021. The study was conducted on a non-probability (purposive) sample of (30) mother their children with sickle cell anemia was chosen. The data were analyzed through the application of descriptive and inferential statistical approaches which are applied by using SPSS version 22.0.
Results: The findings of the study indicated that moderate
In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This study aims to illustrate and compare the perspectives of Ibn Sahnun and al-Kabasi about educational system. To this end, the researcher adopted the inductive-analytical approach to analyze their educational perspectives. The study included two chapters: one to give an overview of the life of Ibn Sahnun and al-Kabasi and the other to analyze their perspectives. The findings revealed Ibn Sahnun and al-Kabasi confirmed that compliance with the Islamic rules is an essential condition over all aspects. As for Ibn Sahnun pointed out to the important of teaching Quran as a basic reference and guide of Muslim daily-life skills and behaviors. On the other hand, al-Kabasi focused on the creation and religion as two-main aspe
... Show More