Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopting a combination of Singular Value Decomposition (SVD), and Discrete Wavelet Transform (DWT). The combination of these two signal processing techniques is gaining lots of interest in the field of speaker and speech recognition. As a cough recognition approach, we found it well-performing, as it generates and utilizes an efficient minimum number of features. Mean and median frequencies, which are known to be the most useful features in the frequency domain, are applied to generate an effective statistical measure to compare the results. The hybrid structure of DWT and SVD, adopted in this approach adds to its efficiency, where a 200 times reduction, in terms of the number of operations, is achieved. Despite the fact that symptoms of the infected and non-infected people used in the study are having lots of similarities, diagnosis results obtained from the application of the proposed approach show high diagnosis rate, which is proved through the matching with relevant PCR tests. The proposed approach is open for more improvements with its performance further assured by enlarging the dataset, while including healthy people.
In this numerical study a detailed evaluation of the heat transfer characteristics and flow structure in a laminar and turbulent flow through a rectangular channel containing built-in of different type vortex generator has been a accomplished in a range of Reynolds number between 500 and 100,000.A modified version of ESCEAT code has been used to solve Navier-Stokes and energy equations. The purpose of this paper is to present numerical comparisons in terms of temperature, Nusselt number and flow patterns on several configurations of longitudinal vortex generator including new five cases. The structures of heat and flow were studied, using iso-contours of velocity components, vortices, temperature and Nusselt n
... Show MoreBackground: Knowledge about the prevalence and distribution of pathologies in a particular location is important when a differential diagnosis is being formulated. The aim of this study was to describe the prevalence and the clinicopathological features of odontogenic cysts and tumors affecting the maxilla and to discuss the unusual presentation of those lesions within maxillary sinus.
Materials and Methods: A multicenter retrospective analysis was performed on pathology archives of patients who were diagnosed with maxillary odontogenic cysts and tumors from 2010 to 2020. Data were collected with respect to age, gender and location.
Result: A total of 384 cases was identified, 320 (83.3%) cases were diagnosed as odontogenic
... Show MoreVaried uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreThis paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreWomen are considered important characters and subjects of discussion in the Glorious Qur’an. Some are portrayed in a positive light while others are condemned . Most women in the Glorious Qur’an are represented as either the mothers or wives of certain leaders and prophets. But the lexical items “Imra’a” امراة and “zawj” زوج occur in the Glorious Qur’an with different meanings depending on the context where they occur.
Translation of the Glorious Qur'an has always been a problematic and difficult issue. Since the Glorious Qur'an is regarded as miraculous and inimitable (i'jaz al-Qur'an), Muslims argue that the Qur'anic text should not be separated from its
... Show MorePraise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
This research included important results, th