The control of prostheses and their complexities is one of the greatest challenges limiting wide amputees’ use of upper limb prostheses. The main challenges include the difficulty of extracting signals for controlling the prostheses, limited number of degrees of freedom (DoF), and cost-prohibitive for complex controlling systems. In this study, a real-time hybrid control system, based on electromyography (EMG) and voice commands (VC) is designed to render the prosthesis more dexterous with the ability to accomplish amputee’s daily activities proficiently. The voice and EMG systems were combined in three proposed hybrid strategies, each strategy had different number of movements depending on the combination protocol between voice and EMG control systems. Furthermore, the designed control system might serve a large number of amputees with different amputation levels, and since it has a reasonable cost and be easy to use. The performance of the proposed control system, based on hybrid strategies, was tested by intact-limbed and amputee participants for controlling the HANDi hand. The results showed that the proposed hybrid control system was robust, feasible, with an accuracy of 94%, 98%, and 99% for Strategies 1, 2, and 3, respectively. It was possible to specify the grip force applied to the prosthetic hand within three gripping forces. The amputees participated in this study preferred combination Strategy 3 where the voice and EMG are working concurrently, with an accuracy of 99%.
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed
... Show MoreThe heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed
... Show MoreIn this paper, our purpose is to study the classical continuous optimal control (CCOC) for quaternary nonlinear parabolic boundary value problems (QNLPBVPs). The existence and uniqueness theorem (EUTh) for the quaternary state vector solution (QSVS) of the weak form (WF) for the QNLPBVPs with a given quaternary classical continuous control vector (QCCCV) is stated and proved via the Galerkin Method (GM) and the first compactness theorem under suitable assumptions(ASSUMS). Furthermore, the continuity operator for the existence theorem of a QCCCV dominated by the QNLPBVPs is stated and proved under suitable conditions.
Dates are considered one of the most important foods consumed in Arab countries. Dates are commonly infested with the sawtoothed grain beetle, Oryzaephilus surinamensis. Consequently, the date yield, quantity, and quality (economic value and seed viability) are negatively affected. This study was designed to investigate the effectiveness of air evacuation as eco-friendly and safe control method against adult O. surinamensis. Insects were obtained from the infested date purchased from a private store in sakaka city, Aljouf region, Saudi Arabia. Air evacuation (using a vacuum pump) and food deprivation were applied to O. surinamensis, and insect mortality was observed daily in comparison with the control group (a
... Show More