In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesion from five Macaca fasicularis monkeys. The proposed classifier is based on a CNN using filtered segmented EMG signals from the pre- and post-lesion periods as inputs, while the kNN is designed using four hand-crafted EMG features. The results suggest that the CNN provides a promising classification technique for TSCI, compared to conventional machine learning classification. The kNN with hand-crafted EMG features classified the pre- and post-lesion EMG data with an F-measure of 89.7% and 92.7% for the left- and right-side muscles, respectively, while the CNN with the EMG segments classified the data with an F-measure of 89.8% and 96.9% for the left- and right-side muscles, respectively. Finally, the proposed deep learning classification model (CNN), with its learning ability of high-level features using EMG segments as inputs, shows high potential and promising results for use as a TSCI classification system. Future studies can confirm this finding by considering more subjects.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreTo maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show Moreاشتمل هذا البحث على مقدمة البحث واهميته والاثر المهم للوسائل التدريبية اذ تجلت أهمية البحث في الوسائل المساعدة ودورها في تطوير أداء السلسلة الحركية على عارضة التوازن للطالبات مما يساعد في اختزال الوقت وتقليل الجهد المبذول وبناء قاعدة جيدة للمرحلة المقبلة وكذلك إيجاد انسب التمرينات وفق للوسيلة المساعدة المستخدمة وذلك لغرض تطوير المهارات الأساسية على عارضة التوازن في جمناستك الفني وحددت الباحثة مشكلة
... Show MoreThe aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreAbstract
The current research aims to identify the analysis of the questions for the book of literary criticism for the preparatory stage according to Bloom's classification. The research community consists of (34) exercises and (45) questions. The researcher used the method of analyzing questions and prepared a preliminary list that includes criteria that are supposed to measure exercises, which were selected based on Bloom's classification and the extant literature related to the topic. The scales were exposed to a jury of experts and specialists in curricula and methods of teaching the Arabic language. The scales obtained a complete agreement. Thus, it was adapted to become a reliable instrument in this
... Show MoreTo assess the biochemical, mechanical and structural characteristics of retained dentin after applying three novel bromelain‑contained chemomechanical caries removal (CMCR) formulations in comparison to the conventional excavation methods (hand and rotary) and a commercial papain‑contained gel (Brix 3000). Seventy‑two extracted permanent molars with natural occlusal carious lesions (score > 4 following the International Caries Detection and Assessment System (ICDAS‑II)) were randomly allocated into six groups (n = 12) according to the excavation methods: hand excavation, rotary excavation, Brix 3000, bromelain‑contained gel (F1), bromelain‑chloramine‑T (F2), and bromelain chlorhexidine gel (F3). The superficial and deepe
... Show MoreAtomic Force Microscope is an efficient tool to study the topography of precipitate. A study using Continuous Flow Injection via the use of Ayah 6SX1-T-2D Solar cell CFI Analyser . It was found that Cyproheptadine –HCl form precipitates of different quality using a precipitating agent's potassium hexacyanoferrate (III) and sodium nitroprusside. The formed precipitates are collected as they are formed in the usual sequence of forming the precipitate via the continuous flow .The precipitates are collected and dried under normal atmospheric pressure. The precipitates are subjected to atomic force microscope scanning to study the variation and differences of these precipitates relating them to the kind of response to both precipitates give
... Show More