Preferred Language
Articles
/
ijs-1981
Epileptic Seizures Detection Using DCT-II and KNN Classifier in Long-Term EEG Signals
...Show More Authors

     Epilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of  one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-seizure) based on Euclidean distance. The experimental results are tested on 21 patients included in the CHB-MIT dataset. The average F1-score was found to be 93.12, whereas the False-Positive Rate (FPR) average was determined to be 0.07.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
International Journal Of Drug Delivery Technology
Simple and Rapid Method For Estimate of Propranolol With Bi (III) Via Long-Distance Chasing Photometer (NAG-ADF-300-2) Utilization Continuous Flow Injection Analysis
...Show More Authors

A simple, sensitive and rapid method was used for the estimate of: Propranolol with Bi (III) to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on a reaction between propranolol and Bi (III) in an aqueous medium to obtain a yellow precipitate. Optimum parameters were studied to increase the sensitivity for the developed method. A linear range for calibration graph was 0.1-25 mmol/L for cell A and 1-40 mmol/L for cell B, and LOD 51.8698 ng/200 µL and 363.0886 ng /200 µL , respectively to cell A and cell B with correlation coefficient (r) 0.9975 for cell A, 0.9966 for cell B, RSD% was lower than 1%, (n = 8) for the

... Show More
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Metal (II) Complexes with Tridentate N, N,O Ligand: Synthesis, Characterization and Biological Studies 
...Show More Authors

 The preparation of some new coordination compounds for nikel (II), manganese (II), copper (II), cobalt (II)and mercury (II), with ligand obtained from Benzoinand2-amino pyridine.The ligand[6-(2-hydroxy-1,2-diphenylethylideneamino)pyridin-3-ylium)](L) was made from reactin ethanol with metal salts in (1:1)(metal : ligand)ratio.[MLCl] was the inclusive formula of the complexes where M= Mn(II),Co(II),Ni(II),Cu(II) and Hg(II). Metal analysis by electronic spectra, atomic absorption ,infrared spectra, 1H&13C-NMR(only ligand)spectral studies, magnetic moment and molar conductance measurements used to describe the compounds.The determinations indicated that the ligand coordinates with the metal (II) ion in neutral tridentate manner th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Desalination And Water Treatment
Biosorption of Cd(II) ions by Chlorella microalgae: isotherm, kinetics processes and biodiesel production
...Show More Authors

This study aims to remove Cd(II) ions from simulated wastewater by using Chlorophyceae algae (CA). Different parameters were studied to show their effects on the biosorption efficiency of CA. These parameters are: the effect of pH 3-7, initial metal ion concentration 20-200 mg/L, sorbent dos-age 0.05-2 g/L, contact time 5-180 min, and agitation speed 100-300 rpm. We found that both the Langmuir and Freundlich models appropriate for characterizing the metal removal process. The biosorption data fit best with the results of the pseudo-second-order kinetic model, demonstrating that the chemisorption process is the dominant mechanism controlling the removal. CA was char-acterized using the scanning electron microscopy test, prior to and post bi

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Detection of Methamphetamine using Nanobentonite as a Novel Solid Phase Extraction Column Matrix Assisted with Gas Chromatography- Mass Spectroscopy
...Show More Authors

          This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Chromogenic in Situ Hybridization for Human Cytomegalovirus-DNA Detection in Tissue Subsets with Prostatic Adenocarcinoma and Benign Hyperplasia
...Show More Authors

     Human cytomegalovirus (HCMV) infects a wide range of human cells, resulting in both benign and malignant tumors. In the last few decades, proteins and/or nucleic acids of the virus were found to be often highly expressed in in patients with basal cell hyperplasia and prostatic neoplasia.

This research aimed to unravel the rate of HCMV infections among prostatic tissue subsets from Iraqi patients with adenocarcinoma and benign hyperplasia.

One hundred, formalin-fixed and paraffin embedded prostatic tissues were obtained from 40 tissue samples collected from different grades of prostate carcinoma; 40 from benign prostatic hyperplasia and 20 from apparently healthy prostatic tissues. These tissue spe

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Carbohydrate Antigen CA19-9 Levels in Sera and Tissues' Homogenate of Breast and Thyroid Benign Cases
...Show More Authors

         The aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Helicobacter Pylori IgG and IgA , Serum Biomarkers CA19-9 and CEA in Patients with Gastrointestinal Diseases
...Show More Authors

Gastrointestinal diseases and especially chronic gastritis are mainly induced by Helicobacter pylori infection, and provides the basis for gastric carcinogenesis and colorectal cancer. The study involved the detection of serum anti-H. pylori IgG and IgA antibody of  and some serum biomarkers ;CEA and CA19-9 in patients with gastrointestinal diseases. Fifty eight serum samples were collected from 25 males and 33 females .Peripheral venous blood was collected from each patient and sera obtained  by centrifugation. Serum anti-H. pylori IgG and IgA ,serum CEA and  CA19-9 were evaluated by enzyme-linked immunoadsorbent assays (ELISA).Forty eight serum samples were positive for IgG (82.7% ) divided int

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

View Publication Preview PDF
Crossref