Background: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study. For each patient, the ECG tracing had been analyzed
for rhythm, p-wave, P-R interval, QRS axis, duration and
T-wave in V1 and any chamber enlargement.
Results: The ECG analysis revealed that all patients had
sinus rhythm, normal P-R interval and normal p-wave
duration and amplitude, and normal QRS duration. All
studied patients had one criteria of RVH and 95% of them
had two or more of such criteria.
Conclusion: we found that in the absence of RVH
criteria, the diagnosis of TOF is unlikely and the present of
northwest axis should indicate canal type VSD
The growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe electrochemical polymerization of the monomer sulfanilamide (SAM) in an aqueous solution at room temperature produces polysulfanilamide (PSAM). The Fourier Transform Infrared spectroscopy (FTIR) was used to investigate the properties of the prepared polymer layer that generated on the stainless steel (St.S) surface (working electrode) and Atomic Force Microscope (AFM) was used to characterize the morphology, topology, and detailed surface structure of polymer layer that generated on the surface. The corrosion behavior of uncoated and coated St.S were evaluated by using the electrochemical polarization method in a 0.2 M HCl solution and a temperature range of 293–323 K, the anticorrosion action of the polymer coating on stainless steel
... Show MoreTo understand what the arts in general, and plastic arts in particular, have to do, it is necessary to know how they perform, not only that, but also to know their history, which we should understand at least in general terms. Which in turn gives an image of the standards of taste prevailing in each age, and some of the social and historical relationship of each era, and the cultural expression of that era, which is shown in the arts. We need to understand that the arts of each stage, although different from each other, yet remain interrelated in what we see through the effects that appear through the succession of times, which creates certain artistic traditions, inherited by one generation after the other. The research in this field de
... Show MoreThis research is dedicated to study Al-Ra’ee Al-Numayri, a distinctive poetic character, to find out the most important (artistic) pre-Islamic features that contributed to its formation. It is further dedicated to know the influence of these features on his literature in the literary arena. After surveying his poetic texts and reading them according to the analytical and investigative methods, the art of the researcher was limited to the field of traditionalists. He was following the footsteps of the ancients by adhering to the traditional Arabic poetry style and the traditional poetic image. Despite that, he had his own imprints and unique style of interrogating times and places with its people, animals and plants. H
... Show More