Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that using mean absolute value (MAV), waveform length (WL), Wilson Amplitude (WAMP), Sine Slope Changes (SSC), and Cardinality features of the proposed algorithm achieves a classification accuracy of 89.6% when classifying seven distinct types of hand and wrist movement. Index Terms— Human Robot Interaction, Bio-signals Analysis, LDA classifier.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreNuclear medicine is important for both diagnosis and treatment. The most common treatment for diseases is radiation therapy used against cancer. The radiation intensity of the treatment is often less than its ability to cause damage, so radiation must be carefully controlled. The interactions of alpha particle with matter were studied and the stopping powers of alpha particle with ovary tissue were calculated using Beth-Bloch equation, Zeigler’s formula and SRIM Software also the range and Liner Energy Transfer (LET) and ovary thickness as well as dose and dose equivalent for this particle were calculated by using Matlab language for (0.01-200) MeV alpha energy.
As modern radiotherapy technology advances, radiation dose and dose distribution have improved significantly. As part of a natural evolution, there has recently been renewed interest in therapy, particularly in the use of heavy charged particles, because these types of radiation serve theoretical advantages in all biological and physical aspects. The interactions of alpha particle with matter were studied and the stopping powers of alpha particle with Breast Tissue were calculated by using Beth-Bloch equation, Zeigler's formula and SRIM software, also the Range and Liner Energy Transfer (LET) and Breast Thickness As well as Dose and Dose equivalent for this particle were calculated by using Mat lab language for (0.01-200) MeV alpha ene
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show More—This paper studies the control motion of a single link flexible joint robot by using a hierarchical non-singular terminal sliding mode controller (HNTSMC). In comparison to the conventional sliding mode controller (CSMC), the proposed algorithm (NTSMC) not only can conserve characteristics of the convention CSMC, such as easy implementation, guaranteed stability and good robustness against system uncertainties and external disturbances, but also can ensure a faster convergence rate of the systems states to zero in a finite time and singularity free. The flexible joint robot (FJR) is a two degree of freedom (2DOF) nonlinear and underactuated system. The system here is modeled as a fourth order system by using Lagrangian method. Based on t
... Show MoreThis paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show Moreالحمد الله أولا واخرا وبعد .. إن الواقع الذي عايشه الناس في ظل دولة المسلمين منذ إقامة دولة الإسلام بعد بعثة الرسول الكريم (صلى الله عليه وسلم ) في المدينة ولأكثر من أربعة عشر قرنا نرى إنه عاش في كنف هذه الدولة الكبيرة من بلاد الصين شرقا وإلى وسط أوربا وجنوب فرنسا غربا العشرات من الملل و الأديان والأجناس وممن لا يدينون بالإسلام وهم كما تحفظ لهم دولة الإسلام منهم وعيشهم الرغيد فهم يمارسون شعائرهم وطقوسهم الديني
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More