Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopting a combination of Singular Value Decomposition (SVD), and Discrete Wavelet Transform (DWT). The combination of these two signal processing techniques is gaining lots of interest in the field of speaker and speech recognition. As a cough recognition approach, we found it well-performing, as it generates and utilizes an efficient minimum number of features. Mean and median frequencies, which are known to be the most useful features in the frequency domain, are applied to generate an effective statistical measure to compare the results. The hybrid structure of DWT and SVD, adopted in this approach adds to its efficiency, where a 200 times reduction, in terms of the number of operations, is achieved. Despite the fact that symptoms of the infected and non-infected people used in the study are having lots of similarities, diagnosis results obtained from the application of the proposed approach show high diagnosis rate, which is proved through the matching with relevant PCR tests. The proposed approach is open for more improvements with its performance further assured by enlarging the dataset, while including healthy people.
KE Sharquie, AA Al-Nuaimy, WJ Kadhum, Saudi medical journal, 2006 - Cited by 3
Background: The present in-vitro study was undertaken to evaluate and compare fracture resistance of weakened endodontically treated premolars with class II MOD cavities restored with different bulk fill composite restorations (EverX posterior, Alert, Tetric EvoCeram Bulk Fill, and SDR). The type and mode of fracture were also assessed for all the experimental groups. Materials and Method: Forty-eight human adult maxillary premolar teeth were selected for this study. Standardized extensive class II MOD cavities with endodontic treatment were prepared for all teeth, except those that were saved as intact control. The teeth were divided into six groups of eight teeth each (n=8): (Group 1) intact control group, (Group 2) unrestored teeth with
... Show MoreObjectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars e
... Show MoreThe present study provides a new insight into valuable information on the diverse structure of the Anisakid population and discusses the limited species richness in the Nemipterus japonicus (Bloch,1791) (Perciformes, Nemiperidae). The fishing area consists of various locations in the Arabian Gulf (29°58 0 33 00 N48°28 0 20 E). A total of 315 marine fish were examined, (n=287) were infected. Larval stages (n= 763) encysted within the mesenteries peritoneum and viscera of fish organs were isolated, with a prevalence of 91.11% of infection and, the intensity was 2.65. Molecular analysis was carried out on thirty individuals who have examined the morphology and showed some appearance differences, by amplifying internal transcribed spacers
... Show MoreAromatic Schiff-bases are known to have antibacterial activity, but most of these compounds are sparingly soluble in water. The present work describes the synthesis of new Schiff-bases derived from branched aminosugars. Treatment of 3-Amino-3-Cyano-3-Deoxy-1,2:5,6-Di-O-Isopropylene-α-D-Allofuranose (1) with the aldehydes (2) under reflux in methanol afforded the Schiff-bases (3) in good yields. The new Schiff-bases were in accord with their NMR, IR spectral data and elemental analysis.
The present study was carried to evaluate antibacterial activity of Acetone, Alcholic (cold and hot) and Aqueaus(water) extracts of Citrus aurantifoliaseeds,against growth of some bacteria isolated from burns infections(Pseudomonas aeruginosa,Escherichia coli, Klebsiellapneumonia,Staphylococcusaureus)fromKindy HospitalIn Baghdad from March to June 2012.Antibiotic Sensitivity was done for all isolated bacteria used in this study.Results showed variation in antibacterial activity of different extracts against all tested bacteria by well diffusion technique in agar and measuring the diameter of inhibition zone, at concentration 250Mg-ml. Acetone extract had the greatest inhibitory effect followed by hot alcoholci extract, and then cold alcohol
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points 
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Type 2 diabetes mellitus (T2DM) is a chronic disorder that is a serious health concern all over the globe, it is linked to Interleukin-10 (IL-10) single nucleotide polymorphisms (SNPs) at the promoter region. On the other hand, diabetes influences the cellular and humoral immunity predisposing the patient to a variety of opportunistic parasites one of them is Toxoplasma gondii (T. gondii), which may infect any nucleated cell, including pancreatic cells. The purpose of this research was to explore the association of IL-10 genetic polymorphisms with T2DM and latent toxoplasmosis among Iraqi patients with T2DM. Fifty-five and fifty-eight venous blood samples were taken from T2DM patients and age-matched non-diabetic person
... Show More