Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe materials of soil were affected by multi reasons; such as human activities, floods, tidal waves, ... etc. The change of the soil contents could be measured through different indexes; such as electric conductivities, salinity, concentration of the heavy elements, and concentration of essential elements ... etc. The land cover is affected by natural influences, like tidal energy, which plays a negative role in the salinization of land adjacent to the coasts, causing a problem for soils in all its details represented in changing of the dissolved elements in soil. One of the most important natural factors that cause soil salinity is human activity in all its forms, and one of the most important causes of salinity is the phenomenon o
... Show MoreOne of the most important problems that would continuously face the Higher education organizations is how to improve the service level presented by them, and how this can lead to increase demand for services of this organizations.As this issue has exhausted many organizations pushed some of them to withdraw from the market Because of weaknesses in their services. Here lies the importance of this matter to be given more attention in order to maintain the organization competitive position. According to that, The selection of the research title (The Impact of Quality on the Level of the University Service Request) which seeks to measure the impact of service quality on the level of demand, At a time when world&
... Show MoreCdSe quantum dots possess a tuning energy gap which can control gap values according to the size of the quantum dots, this is made the material able to absorb the wavelengths within visible light. A simple model is provided for the absorption coefficient, optical properties, and optical constants for CdSe quantum dots from the size 10nm to 1nm with the range of visible region between (300-730) nm at room temperature. It turns out that there is an absorption threshold for each wavelength, CdSe quantum dots begin to absorb the visible spectrum of 1.4 nm at room temperature for a wavelength of 300 nm. It has been noted that; when the wavelength is increased, the absorption threshold also increases. This applies to the optical propertie
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreIn the era of the digital economy, public organizations need to consolidation the capabilities of entrepreneurial alertness to reduce the risks of sudden transformations and changes, and to find effective mechanisms to discover and invest in environmental opportunities proactively, as this concern has become a knowledge gap in public sector institutions, the current research aims to identify the role of digital competence in influencing on entrepreneurial alertness in the Central Bank of Iraq (CBI), the descriptive analytical approach was used as a research method to describe and analyze the main research variables. digital competence as an explanatory variable includes three dimensions: digital infrastructure, digital integration, and d
... Show MoreThe research aims at clarifying the relationship between innovative marketing skills and broad recommendation as a vital and important issue for organizations in general and service organizations in particular to demonstrate how innovative marketing skills contribute to broad adoption and to determine the relationship between interdependence and the impact of innovative marketing skills on the broad recommendation. Some questions are posed by the research problem. Is there a clear awareness among individuals in the company about the concept of marketing marketing skills and how do innovative marketing skills affect the broad recommendation of the surveyed company? How innovative marketing skills relate to the broad recommendation
... Show More