Decoding transient sEMG data for intent motion recognition in transhumeral amputees
...Show More Authors
The recognition of handwritten numerals has many applications in automatic identification and cognition. This research contains three experimented scenarios to recognize the handwritten English (i.e. Arabic) numerals. In the first scenario the bilinear interpolation of the image is used, while in the second scenario and after the bilinear interpolation is being applied, the Sobel operators are applied on the resulted interpolated image. In the third scenario which represents the last one, the effect of normalization of image dimensions is tested. 550 images of handwritten numerals were tested. Three types of tests were conducted for each scenario namely: trained-set test, not-trained-set test and comprehensive-set test. Depending on the
... Show MoreAutomatic license plate recognition (ALPR) used for many applications especially in security applications, including border control. However, more accurate and language-independent techniques are still needed. This work provides a new approach to identifying Arabic license plates in different formats, colors, and even including English characters. Numbers, characters, and layouts with either 1-line or 2-line layouts are presented. For the test, we intend to use Iraqi license plates as there is a wide range of license plate styles written in Arabic, Kurdish, and English/Arabic languages, each different in style and color. This variety makes it difficult for recent traditional license plate recognition systems and algorithms to recogn
... Show MoreThis paper presents a control system to make the robotic hand mimic human hand motion in real time and offline mode. The human hand tracking system is a wearable sensing arm (potentiometers) used to determine the position in space and to sense the grasping task of human hand. The maskable sensing arm was designed with same geometrical arrangement of robotic hand that needs to be controlled. The control software of a robot was implemented using Visual Basic and supported with graphical user interface (GUI). The control algorithm depends on joint to joint mapping method to match between the motions at each joint of portable sensing arm with corresponding joint of a robot in order to make the robot mimic the motion.
There are two main categories of force control schemes: hybrid position-force control and impedance control. However, the former does not take into account the dynamic interaction between the robot’s end effector and the environment. In contrast, impedance control includes regulation and stabilization of robot motion by creating a mathematical relationship between the interaction forces and the reference trajectories. It involves an energetic pair of a flow and an effort, instead of controlling a single position or a force. A mass-spring-damper impedance filter is generally used for safe interaction purposes. Tuning the parameters of the impedance filter is important and, if an unsuitable strategy is used, this can lead to unstabl
... Show MoreMobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More