A Robust Multi-Channel EEG Signals Preprocessing Method for Enhanced Upper Extremity Motor Imagery Decoding
...Show More Authors
This paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
The research problem is represented in the weakness of reliance on the role of some motor abilities (flexibility, balance and compatibility) in biomechanical indicators and the performance of a large number of gymnastics skills, including the skill of the human wheel, in addition to the lack of reliance on the use of video imaging of the skill in order to analyze its path and identify its weaknesses. The research aimed to identify the relationship between motor abilities, biomechanical indicators and the degree of performance of the skill of the human wheel, and the descriptive method was used on its own, chosen in an intentional method, consisting of (10) students from the third stage in the Department of Physical Education and Sp
... Show MoreThe research aim at identifying the time of motor response to auditory and visual stimuli as well as identifying the accuracy of blocking and finding the relationship between motor repose time and blocking accuracy. The community was (7) primer soccer league of 2019 – 2020 and the subjects were (24) volleyball players from Al Jaish and Al Shorta clubs ten players from Al Shorta club performed the pilot study. The researchers used the descriptive method and the data was collected and treated using SPSS. The results showed a significant relationship between response time and blocking accuracy. The researchers recommended concentrating on applying scientific principles for developing time of motor response in a manner suitable for bl
... Show More: Porous silicon (n-PS) films can be prepared by photoelectochemical etching (PECE) Silicon chips n - types with 15 (mA /cm2), in15 minutes etching time on the fabrication nano-sized pore arrangement. By using X-ray diffraction measurement and atomic power microscopy characteristics (AFM), PS was investigated. It was also evaluated the crystallites size from (XRD) for the PS nanoscale. The atomic force microscopy confirmed the nano-metric size chemical fictionalization through the electrochemical etching that was shown on the PS surface chemical composition. The atomic power microscopy checks showed the roughness of the silicon surface. It is also notified (TiO2) preparation nano-particles that were prepared by pulse laser eradication in e
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More