This paper presents a comparison between the electroencephalogram (EEG) channels during scoliosis correction surgeries. Surgeons use many hand tools and electronic devices that directly affect the EEG channels. These noises do not affect the EEG channels uniformly. This research provides a complete system to find the least affected channel by the noise. The presented system consists of five stages: filtering, wavelet decomposing (Level 4), processing the signal bands using four different criteria (mean, energy, entropy and standard deviation), finding the useful channel according to the criteria’s value and, finally, generating a combinational signal from Channels 1 and 2. Experimentally, two channels of EEG data were recorded from six patients who underwent scoliosis correction surgeries in the Pusat Perubatan Universiti Kebangsaan Malaysia (PPUKM) (the Medical center of National University of Malaysia). The combinational signal was tested by power spectral density, cross-correlation function and wavelet coherence. The experimental results show that the system-outputted EEG signals are neatly switched without any substantial changes in the consistency of EEG components. This paper provides an efficient procedure for analyzing EEG signals in order to avoid averaging the channels that lead to redistribution of the noise on both channels, reducing the dimensionality of the EEG features and preparing the best EEG stream for the classification and monitoring stage.
Abstract
The issue of inequality in distribution of income and / or consumption expenditure is related to economic welfare because there is an inverse relationship between the economic welfare on the one hand, and the degree of inequality, on the other hand. Despite the fact that inequality is considered as normal phenomenon in every society, but if it exceeded certain limits it will lead to undesirable economic, social and political consequences. Therefore, the availability of indicators about inequality is a necessary tool for planning and evaluation of economic development programs. So, current study is aiming at measuring and analyzing the degree of inequality in distribution of consumpti
... Show More
Background: Although underdeveloped in Iraq, telehealth was one tool used to continue health service provision during the COVID-19 pandemic. Aim: To assess women’s experiences and satisfaction with gynaecological and obstetric telehealth services in Iraq during the COVID-19 pandemic. Methods: Free telehealth services were provided by 4 obstetrician-gynaecologists associated with private clinics in 2020–2021. All patients who accessed the services between June 2020 and February 2021 were invited to complete a postconsultation survey on their experience and satisfaction with services. Results were analysed using descriptive statistics and logistic regression conducted using SPSS version 25. Results: A total of 151 (30.2%) women re
... Show MoreKE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Drugs in Dermatology: JDD, 2013 - Cited by 22
This study aims to identify changes in vegetation cover and its impact on the climate of Mosul City. The analytical method of the study relies on changes in Land Use/Land Cover (LULC), Normalized Difference Vegetation Index (NDVI), and Land Surface Temperature (LST); GIS technology was used to measure these statistics. Landsat (5,8) imagery was used to detect the change in vegetation cover change and land surface temperature during the study period from 2010 to 2022, where the unsupervised classification technique was used to determine LU variations. The results revealed significant changes among the LU classes during the study period, primarily due to human activities. The most prominent change in LU was the urban expansion of agricultural
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreA number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col
... Show MoreIn this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image, the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThis research aims to demonstrate the impact of the going concern assumption in different accounting applications to provide a realistic look and more accurate result of activity and financial situation, as well as determining the responsibility of the Company's administration in compliance with the going concern assumption during the preparation for their financial statements, and to clarify the concept of integration between internal audit and external audit about going concern assumption, besides its importance and usefulness on the work of both of the internal auditor and the external auditor, as well as on the company under auditing process.This research purports preparing an internal audit program, including a set of auditing actio
... Show More