This paper presents a comparison between the electroencephalogram (EEG) channels during scoliosis correction surgeries. Surgeons use many hand tools and electronic devices that directly affect the EEG channels. These noises do not affect the EEG channels uniformly. This research provides a complete system to find the least affected channel by the noise. The presented system consists of five stages: filtering, wavelet decomposing (Level 4), processing the signal bands using four different criteria (mean, energy, entropy and standard deviation), finding the useful channel according to the criteria’s value and, finally, generating a combinational signal from Channels 1 and 2. Experimentally, two channels of EEG data were recorded from six patients who underwent scoliosis correction surgeries in the Pusat Perubatan Universiti Kebangsaan Malaysia (PPUKM) (the Medical center of National University of Malaysia). The combinational signal was tested by power spectral density, cross-correlation function and wavelet coherence. The experimental results show that the system-outputted EEG signals are neatly switched without any substantial changes in the consistency of EEG components. This paper provides an efficient procedure for analyzing EEG signals in order to avoid averaging the channels that lead to redistribution of the noise on both channels, reducing the dimensionality of the EEG features and preparing the best EEG stream for the classification and monitoring stage.
In this research, CNRs have been synthesized using pyrolysis of plastic waste(pp) at 1000 ° C for one hour in a closed reactor made from stainless steel, using magnesium oxide (MgO) as a catalyst. The resultant carbon nano rods were purified and characterized using energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of carbon rods were observed with the Field emission scanning electron microscopy (FESEM). The carbon was evenly spread and had the highest concentration from SEM-EDX characterization. The results of XRD and FESEM have shown that carbon Nano rods (CNRs) were present in Nano figures, synthesized at 1000 ° C and with pyrolysis temperature 400° C. One of t
... Show MoreIn this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 cont
... Show More
This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.
Background: Because of its clinical and surgical importance and lack of precise information about this rare and important anatomical landmark, this study was designed to detect the presence, configurations and length of Mandibular Retromolar Canal (MRMC) with aid of CBCT visualization. Materials and methods: In this retrospective study the data was obtained from Specialist Health Center in AL-Sadder city in Baghdad for (100) patients with 200 inferior dental canal, all of them referred to CBCT scan (Kodak 9500, French origin). The scanning was done with tube voltage 90 kVp, tube current with 10mA and exposure time was 10 s., the field of view was measured with 5cm x 3.7cmwith 0.03mm voxel size Results: In the present study the prevalence of
... Show MoreThe spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the
Tooth restoration one of the most common procedures in dental practice. The replacement of the entire restoration leads to loss of tooth structure and increase risk of pulp injury; replacement is also time consuming and costly. According to the minimally invasive approach when minimal defects, repair is the better choice than the total replacement of the restoration. This study aims to evaluate repair rating versus replacement treatment procedure for defective composite fillings among Iraqi dentists. Material and methodology: A questionnaire survey were designed and distributed to 184 post-graduate dentists in Iraq. The inquiry pertained general information; including their clinical experience in years, their preference in terms of direct c
... Show MoreRepresenting banking supervision An important function performed by the Iraqi Central Bank, in order to achieve stability in the financial and banking system, and safeguard the rights of depositors, investors and other targets, and to realize the Iraqi Central Bank banking supervision actors on banks, there must be an awareness of regulatory bank's existing control and subject them, as well as the role of banking oversight interested in spreading this awareness.
So sought search to find out the role played by the Iraqi Central Bank in raising awareness of the regulatory banking between the parties to the regulatory process, through the presentation and analysis of the legal framework for banking supervision and awareness supervisory
This research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More