Traumatic spinal cord injury is a serious neurological disorder. Patients experience a plethora of symptoms that can be attributed to the nerve fiber tracts that are compromised. This includes limb weakness, sensory impairment, and truncal instability, as well as a variety of autonomic abnormalities. This article will discuss how machine learning classification can be used to characterize the initial impairment and subsequent recovery of electromyography signals in an non-human primate model of traumatic spinal cord injury. The ultimate objective is to identify potential treatments for traumatic spinal cord injury. This work focuses specifically on finding a suitable classifier that differentiates between two distinct experimental stages (pre-and post-lesion) using electromyography signals. Eight time-domain features were extracted from the collected electromyography data. To overcome the imbalanced dataset issue, synthetic minority oversampling technique was applied. Different ML classification techniques were applied including multilayer perceptron, support vector machine, K-nearest neighbors, and radial basis function network; then their performances were compared. A confusion matrix and five other statistical metrics (sensitivity, specificity, precision, accuracy, and F-measure) were used to evaluate the performance of the generated classifiers. The results showed that the best classifier for the left- and right-side data is the multilayer perceptron with a total F-measure of 79.5% and 86.0% for the left and right sides, respectively. This work will help to build a reliable classifier that can differentiate between these two phases by utilizing some extracted time-domain electromyography features.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreArab heritage have teem much of the literature value, written by evacuated, who had a legacy of linguistic great scientists, but the circumstances are unknown, did not write those books or authors emerge, chose to search for a book of those compositions, he did not write to him and his book emerge, fell hands a book (Altvsh in the language) to Abu Sufyan grammar, a fourth-century scientists, as it is Abu Sufyan grammar of scientists who rolled up the time their impact, and the cryptic revelations among the stars, preferring to stand on this book and its author, a statement of the most important grammatical aspects contained therein; to notch the curtain for this world, and his book (Altvsh in strewn language and Mnzawmha and express the
... Show MoreSkills learning is considered as an important factor in learning any subject as well as mathematics . Mathematical skills have a number of steps that should be learned and understood faster and with more accuracy . The practical or applied skills are type of learning which includes educational preparation and hand on skills is acquired which conducted by organized educational institutions. The sample included (120) students (males and females) first year / dept.of electrical technigues . The mathematical skills are implemented to wire up the electrical circuts. Test is implemented with questions concerned with the skills .statistical operations were conducted as well as the validity and standard deviation for the test .The results showed
... Show MoreEmergency vehicle (EV) services save lives around the world. The necessary fast response of EVs requires minimising travel time. Preempting traffic signals can enable EVs to reach the desired location quickly. Most of the current research tries to decrease EV delays but neglects the resulting negative impacts of the preemption on other vehicles in the side roads. This paper proposes a dynamic preemption algorithm to control the traffic signal by adjusting some cycles to balance between the two critical goals: minimal delay for EVs with no stop, and a small additional delay to the vehicles on the side roads. This method is applicable to preempt traffic lights for EVs through an Intelli
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThe significance of the research lies in the fact that electronic technologies represent an important step in evaluating legal situations, and the research problem centered on the lack of attention to visual requirements and the absence of a clear image of legal situations that may be difficult for the referee to apply correctly in addition to the lack of focus on visual requirements and the unclear depiction of some legal cases which make it difficult for the referee to interpret them correctly This is because the referee's main tool is visual perception, which interprets live situations such as violations, fouls, and other cases that arise during a game Moreover, there are numerous responses and challenges in evaluating legal situ
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreThe proton momentum distributions (PMD) and the elastic
electron scattering form factors F(q) of the ground state for some
even mass nuclei in the 2p-1f shell for 70Ge, 72Ge, 74Ge and 76Ge are
calculated by using the Coherent Density Fluctuation Model (CDFM)
and expressed in terms of the fluctuation function (weight function)
|F(x)|2. The fluctuation function has been related to the charge
density distribution (CDD) of the nuclei and determined from the
theory and experiment. The property of the long-tail behavior at high
momentum region of the proton momentum distribution has been
obtained by both the theoretical and experimental fluctuation
functions. The calculated form factors F (q) of all nuclei under s