Preferred Language
Articles
/
bsj-6516
COVID-19 Diagnosis Using Spectral and Statistical Analysis of Cough Recordings Based on the Combination of SVD and DWT
...Show More Authors

Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopting a combination of Singular Value Decomposition (SVD), and Discrete Wavelet Transform (DWT). The combination of these two signal processing techniques is gaining lots of interest in the field of speaker and speech recognition. As a cough recognition approach, we found it well-performing, as it generates and utilizes an efficient minimum number of features. Mean and median frequencies, which are known to be the most useful features in the frequency domain, are applied to generate an effective statistical measure to compare the results. The hybrid structure of DWT and SVD, adopted in this approach adds to its efficiency, where a 200 times reduction, in terms of the number of operations, is achieved. Despite the fact that symptoms of the infected and non-infected people used in the study are having lots of similarities, diagnosis results obtained from the application of the proposed approach show high diagnosis rate, which is proved through the matching with relevant PCR tests.  The proposed approach is open for more improvements with its performance further assured by enlarging the dataset, while including healthy people.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis, Spectral Study and Theoretical Treatment of Some Mixing Ligand Complexes of Quinaldic Acid and 1, 10-Phenathroline
...Show More Authors

Metal complexes of Cu (II), Fe (III) and Mn (II) with Quinaldic acid (L1) and 1, 10-Phenathroline (L2) are synthesized and characterized by standaral physic- chemical procedures (element analysis, metal analysis, FTIR, Uv-Vis, magnetic moment and conductometeric measurements). On the base of these studies, mononuclear and six coordinated octahedral geometry and nonelectrolyte of these complexes have been proposed. The standard heat of formation (?Hºf) and binding energy (?Eb) for the free ligands and their complexes are calculated by using the PM3 method at 273K of Hyperchem.-8 program. The complexes are more stable than their ligands. Moreover, the electrostatic potential of free ligands are measured to investigate the reactive site of th

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of a Dot -ELIZA for the Diagnosis of Human Hydatid Disease
...Show More Authors

Fourty  -tow   Libyan     patients  with  hydatidosis,  which  were

referred to by the physician for the detection of hydatid cyst by X - rays, Ultrasound and CT-Scan.  The  infection rate  in  females and males was(69% )and (31% )respectively .The highest rate 69% was in the liver, followed by the lung( 23.8%), the brain (4.8%) and kidney

(2.4%).

A total of  42 serum  samples were gathered from Libyan patients infected with hydatidosis, 33 serum samples from patients cases with other parasitic diseases than hydatidosis and 30 serum samples from healthy normal controls and were tested by Dot-ELIZA utilizing antigen B from sheep hy

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Evaluation of D-Dimer in the diagnosis of suspected deep vein thrombosis
...Show More Authors

Background: Deep vein thrombosis is a multi causal disease and its one of most common venous disorder, but only one quarter of the patients who have signs and symptoms of a clot in the vein actually have thrombosis and need treatment .The disease can be difficult to diagnose. Venous ultrasound in combination with clinical finding is accurate for venous thromboembolism, its costly because a large number of patients with suspicious signs and symptoms. Venography still the gold standard for venous thromboembolism but it is invasive. The D-dimer increasingly is being seen as valuable tool rolling out venous thromboembolism and sparing low risk patients for further workup.Objectives: this study has designed the role of D-dimer to confirm diag

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
The Use of Social Networking sites in the Marketing of Values Analytical : Study of the Official Pages of the Ministry of Culture, Tourism and Antiquities and the Ministry of Labor and Social Affairs on Facebook
...Show More Authors

The social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.

   The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.

     The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Study the contrast of thermal expansion behavior for PMMA denture base, single and hybrid reinforced using the thermomechanical analysis technique (TMA)
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multipole Mixing Ratios of Gamma Rays From Fe(n,ny Reaction Using Constant Statistical Tensor Method (CST).
...Show More Authors

The - M ultiple mixing ratios of -transitions from levels of 56Fe populated in 56 56 Fe n n Fe ( , )  reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitions، in our work we used This method for mixed  - transitions in addition to pure  - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet - values. It is clear from the results that the - values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur are due to inaccuracies existing in the expe

... Show More
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Automatic Detection and Recognition of Car Plates Based on Cascade Classifier
...Show More Authors

The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (12)
Scopus