The second leading cause of death and one of the most common causes of disability in the world is stroke. Researchers have found that brain–computer interface (BCI) techniques can result in better stroke patient rehabilitation. This study used the proposed motor imagery (MI) framework to analyze the electroencephalogram (EEG) dataset from eight subjects in order to enhance the MI-based BCI systems for stroke patients. The preprocessing portion of the framework comprises the use of conventional filters and the independent component analysis (ICA) denoising approach. Fractal dimension (FD) and Hurst exponent (Hur) were then calculated as complexity features, and Tsallis entropy (TsEn) and dispersion entropy (DispEn) were assessed as irregularity parameters. The MI-based BCI features were then statistically retrieved from each participant using two-way analysis of variance (ANOVA) to demonstrate the individuals’ performances from four classes (left hand, right hand, foot, and tongue). The dimensionality reduction algorithm, Laplacian Eigenmap (LE), was used to enhance the MI-based BCI classification performance. Utilizing k-nearest neighbors (KNN), support vector machine (SVM), and random forest (RF) classifiers, the groups of post-stroke patients were ultimately determined. The findings show that LE with RF and KNN obtained 74.48% and 73.20% accuracy, respectively; therefore, the integrated set of the proposed features along with ICA denoising technique can exactly describe the proposed MI framework, which may be used to explore the four classes of MI-based BCI rehabilitation. This study will help clinicians, doctors, and technicians make a good rehabilitation program for people who have had a stroke.
Background: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biolo
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreIdentifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More