Preferred Language
Articles
/
cRYqrIwBVTCNdQwCSv5l
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and cubic SVM
...Show More Authors
Abstract<p>Communication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has proved useful for individuals with severe motor disorder, rehabilitation and has become a means of communication to the real world. This paper investigates the use of Cubic SVM algorithm In the EEG classification. EEG feature extraction is Implemented by maximum overlap discrete wavelet transform (MODWT) to reduce the dimensionality of data. The Sliding Window Technique is used to calculate the mean within each window samples. The feature vectors are loaded into the support vector machine (SVM) and optimize tree.</p>
Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Applied Engineering Science
Design and implementation of a smart home automation system based on global system for mobile communications
...Show More Authors

Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The concept of inconsistency and measuring the inverse relationship between overlap and contrast.
...Show More Authors

 

abstract:

The aim of this study is to clarify the relationship between the concept of  inconsistency and the measurement of the inverse relationship of overlap and contrast. The study will address the following points:

  1. Explaining the true nature of inconsistency and contrast, as understanding their relationship is essential for determining them.
  2. Examining the view of the scholars regarding their significance as approaches to understanding the relationship.
  • Identifying the relationship between inconsistency and contrast in terms of overlap and contrast.

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
The Invariant Moments Based With Wavelet Used To Decide the Authintication and Originality of Images
...Show More Authors

Publication Date
Sat Oct 21 2017
Journal Name
Journal Of New Theory
Cubic hyper KU-ideals
...Show More Authors

It is known that, the concept of hyper KU-algebras is a generalization of KU-algebras. In this paper, we define cubic (strong, weak,s-weak) hyper KU-ideals of hyper KU-algebras and related properties are investigated.

Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Implementation of Power System Stabilizer Based on Conventional and Fuzzy Logic Controllers
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.

 

 

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Baghdad University College Of Education Ibn Al-haitham
Numerical Solution of Linear System of Fredholm Integral Equations Using Haar Wavelet Method
...Show More Authors

The aim of this paper is to present the numerical method for solving linear system of Fredholm integral equations, based on the Haar wavelet approach. Many test problems, for which the exact solution is known, are considered. Compare the results of suggested method with the results of another method (Trapezoidal method). Algorithm and program is written by Matlab vergion 7.

View Publication
Publication Date
Fri Feb 01 2013
Journal Name
Journal Of Applied Research And Technology
Effectiveness of Wavelet Denoising on Electroencephalogram Signals
...Show More Authors

View Publication
Scopus (98)
Crossref (91)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref