Preferred Language
Articles
/
jkmc-758
Electro Cardiographic Features of Ptients With Tetralogy of Fallot
...Show More Authors

Background: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study. For each patient, the ECG tracing had been analyzed
for rhythm, p-wave, P-R interval, QRS axis, duration and
T-wave in V1 and any chamber enlargement.
Results: The ECG analysis revealed that all patients had
sinus rhythm, normal P-R interval and normal p-wave
duration and amplitude, and normal QRS duration. All
studied patients had one criteria of RVH and 95% of them
had two or more of such criteria.
Conclusion: we found that in the absence of RVH
criteria, the diagnosis of TOF is unlikely and the present of
northwest axis should indicate canal type VSD

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extraction of volatile oils and evaluation some features of volatile oil from the leaves of some local Eucalyptus spp trees and comparing them with volatile oil of some foreign species
...Show More Authors

 This study included the extraction of volatile oils from the leaves of some local Eucalyptus trees (i.e.(1)E.camldulensis ,(2) E.camldulensis , E.microtheca , E.globules , E.sideroxylem , E.krusianin. by the water distillation method. As well as exploring some of their physical properties.       The results of this study reveald that the local eucalyptus trees gave a good rate of volatile oil equals to some global kinds and to the rate in India pharmacopeia.       Also the results revealed that there had been concurrence between the percentages of volatile oils and refractive index and specific gravity of the plants on which the study was made to study and those included i

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 26 2022
Journal Name
International Journal Of Corrosion And Scale Inhibition
Synthesis of polysulfanilamide by electro polymerization and its corrosion protective properties on 316L stainless steel in 0.2 M HCl
...Show More Authors

The electrochemical polymerization of the monomer sulfanilamide (SAM) in an aqueous solution at room temperature produces polysulfanilamide (PSAM). The Fourier Transform Infrared spectroscopy (FTIR) was used to investigate the properties of the prepared polymer layer that generated on the stainless steel (St.S) surface (working electrode) and Atomic Force Microscope (AFM) was used to characterize the morphology, topology, and detailed surface structure of polymer layer that generated on the surface. The corrosion behavior of uncoated and coated St.S were evaluated by using the electrochemical polarization method in a 0.2 M HCl solution and a temperature range of 293–323 K, the anticorrosion action of the polymer coating on stainless steel

... Show More
View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Boundary & Geometric Region Features Image Segmentation for Quadtree Partitioning Scheme
...Show More Authors

In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.

Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (4)
Scopus
Publication Date
Sun Aug 22 2021
Journal Name
Iraqi Journal Of Agricultural Sciences
STUDY OF FRUITS MORPHOLOGICAL FEATURES FOR 33 SPECIES BELONG TO CRUCIFERAE FAMILY IN IRAQ
...Show More Authors

The research was aimed to identify fruits morphological characteristics of 33 taxa belonging to the Lepidieae tribe from Brassicaceae. The characteristics of the fruit's general shape, apex shape, dimensions, colors, surface ornamentation, and beak were determined, the results indicated the importance of each of those characters in isolated species, In general, all the tribe's fruits were open capsule and short silicula. According to the dimensions of fruit, three species can be distinguished as a group with dimensions greater than 20mm, as in Brossardia, Coluteocarpus, and Didymophysa, and depending on the shape, it was possible to differentiate the species within this group, while the other species were less than 20 mm. in dimensi

... Show More
Scopus (5)
Scopus Crossref
Publication Date
Tue Aug 02 2022
Journal Name
Dirasat: Human And Social Sciences
Denotation of Narrative Features in Television Advertising (A Semiotic Approach to Mr. President's Declaration)
...Show More Authors

The research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a

... Show More
View Publication
Crossref