Preferred Language
Articles
/
ijs-5199
A Comparative Study Using DCT, Delta Modulation, and Double Shift Coding for Compressing Electroencephalogram Data
...Show More Authors

      Storing, transferring, and processing high-dimensional electroencephalogram (EGG) signals is a critical challenge. The goal of EEG compression is to remove redundant data in EEG signals. Medical signals like EEG must be of high quality for medical diagnosis. This paper uses a compression system with near-zero Mean Squared Error (MSE) based on Discrete Cosine Transform (DCT) and double shift coding for fast and efficient EEG data compression. This paper investigates and compares the use or non-use of delta modulation, which is applied to the transformed and quantized input signal. Double shift coding is applied after mapping the output to positive as a final step. The system performance is tested using EEG data files from the CHB-MIT Scalp EEG Database. Compression Ratio (CR) is used to evaluate the compression system performance. The results are encouraging when compared with previous works on the same data samples.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Cureus
Clinical Descriptive Study of Masturbatory Behavior Among Infants and Preschool Children: A Recent Observation From Iraq
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Portugaliae Electrochimica Acta
A Kinetic Study of Oxalic Acid Electrochemical Oxidation on a Manganese Dioxide Rotating Cylinder Anode
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Al-adab Journal
A Victim of "Love": A Study of Beatrice’s Character in "Rappaccini's Daughter" By Nathanial Hawthorne
...Show More Authors

Nathaniel Hawthorne (1804-1864) has been widely known for his special interest in the female characters. In many of his novels, he narrates the conditions, values, and the institutions that surround and control the life of women, leading them to be victims. In “Rappaccini’s Daughter” (1844), the heroine, Beatrice is created to be victimized by her loved ones (her father and lover). This paper focuses on the term “victim,” it shows its aspects through the development of Beatrice’s character. The paper also studies a female character in the male-dominated society, to show the cruelty done to her, and how she is considered to be a second rate person, who is unable to live normally, or at least to save herself from dea

... Show More
View Publication
Crossref
Publication Date
Wed Feb 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of cavity design for cusp coverage on fracture strength of weakened maxillary first premolars using two esthetic restorative systems (CAD/CAM hybrid ceramic and nanohybrid composite) (An in vitro study)
...Show More Authors

Background: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 X

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Building a Visual Test for Kindergartens’ children
...Show More Authors

The present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu May 06 2010
Journal Name
Journal Of Engineering
A PROPOSED PROCEDURE FOR ANALYSING REINFORCED EMBANKMENTS
...Show More Authors

Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 17 2019
Journal Name
Advances In Intelligent Systems And Computing
A New Arabic Dataset for Emotion Recognition
...Show More Authors

In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref