Hand Gesture Recognition With Acoustic Myography and Wavelet Scattering Transform
...Show More Authors
In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.
A new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th
... Show MoreThis work aims to enhance acoustic and thermal insulation properties for polymeric composite by adding nanoclay and rock wool as reinforcement materials with different rations. A polymer blend of (epoxy+ polyester) as matrix materials was used. The Hand lay-up technique was used to manufacture the castings. Epoxy and polyester were mixed at different weight ratios involving (50:50, 60:40, 70:30, 80:20, and 90:10) wt. % of (epoxy: polyester) wt. % respectively. Impact tests for optimum sample (OMR), caustic and thermal insulation tests were performed. Nano clay (Kaolinite) with ratios ( 5 and 7.5% ) wt.% , also hybrid reinforcement materials involving (Kaolite 5 & 7.5 % wt.% + 10% volume fraction of rockwool ) were added as reinforcem
... Show MoreProsthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)
... Show MoreHands have consistently been an important vehicle in the transmission of disease (1). Thus, thorough hand-washing remains the single most important factor in preventing infection specially in hospitals and labs.Twenty-nine non-clinical volunteers (do not work or come in contact with a clinical or hospital setting) that lacked visible skin injuries, eczema or apparent skin disease were used, those subjects were all tested by a material of each of the three used in the study weekly and laboratory tests were done pre- and post washing.All three material were effective , Eugenol extract as effective as the bar and lotion soap. And this was confirmed statistically.Eugenol has a great antibacterial action even in small concentration and t
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show More