Preferred Language
Articles
/
XhfW0IwBVTCNdQwC_Qhr
Comparison study of classification methods of intramuscular electromyography data for non-human primate model of traumatic spinal cord injury
...Show More Authors

Traumatic spinal cord injury is a serious neurological disorder. Patients experience a plethora of symptoms that can be attributed to the nerve fiber tracts that are compromised. This includes limb weakness, sensory impairment, and truncal instability, as well as a variety of autonomic abnormalities. This article will discuss how machine learning classification can be used to characterize the initial impairment and subsequent recovery of electromyography signals in an non-human primate model of traumatic spinal cord injury. The ultimate objective is to identify potential treatments for traumatic spinal cord injury. This work focuses specifically on finding a suitable classifier that differentiates between two distinct experimental stages (pre-and post-lesion) using electromyography signals. Eight time-domain features were extracted from the collected electromyography data. To overcome the imbalanced dataset issue, synthetic minority oversampling technique was applied. Different ML classification techniques were applied including multilayer perceptron, support vector machine, K-nearest neighbors, and radial basis function network; then their performances were compared. A confusion matrix and five other statistical metrics (sensitivity, specificity, precision, accuracy, and F-measure) were used to evaluate the performance of the generated classifiers. The results showed that the best classifier for the left- and right-side data is the multilayer perceptron with a total F-measure of 79.5% and 86.0% for the left and right sides, respectively. This work will help to build a reliable classifier that can differentiate between these two phases by utilizing some extracted time-domain electromyography features.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Relationship between Very Low Birth Weight Neonates and increased Neonatal mortality for age 0 to 7 days
...Show More Authors

B aa cc kk gg r oo uu nn dd : Very low birth weight (VLBW) neonates constitute approximately 4–7 percent of all live births and their mortality is very high. O bb j ee cc t i vv ee: to find out if there is a relationship between Very Low Birth Weight Neonates and increased neonatal mortality for age 0 to 7 days. M ee t hh oo dd ss A retrospective study of VLBW neonates admitted to NICU at Ibn Al- Baladi Pediatrics and Maternity hospital over one year (2012)were studied, study period was from April till August 2013. Exclusion criteria were: (1) neonates weighing less than 700 g and with gestational age less than 24 weeks (abortion) (2) death in the delivery room (3) neonates weighing more than 1500 g. (4) Postnatal age more than 7 days.

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Linear Increasing in Radial Electronic Density Distribution for K and L Shells throughout Some Be-Like Ions
...Show More Authors

Maximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2022
Journal Name
Journal Of Positive School Psychology
international Accounting Standards for Presentation and Disclosure and their Consistency with Islamic Accounting Standards in Ialamic Banks
...Show More Authors

The aim of the research is to identify the international accounting standards and accounting standards for Islamic banks, and to analyze the most important problems in the application of Islamic accounting standards, as well as to analyze some of the principles and methods used in the application of accounting standards in Islamic banks. The research was built on three hypotheses, the first being (there is a tangible impact on the application of international accounting standards for banks’ management of liquidity, achieving profits, maintaining property rights and fulfilling their obligations), and the second (the bank facing obstacles using Islamic accounting standards, as it is expected that when using Islamic accounting standar

... Show More
View Publication
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Composition operator induced by ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1
...Show More Authors

We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.

View Publication Preview PDF
Crossref
Publication Date
Mon Nov 17 2025
Journal Name
Journal Of Physical Education
Academic Achievement Level and Its Relationship with Some Fundamental Skills in Fencing for Third Year College Students
...Show More Authors

View Publication
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Mon Nov 17 2025
Journal Name
Journal Of Administration And Economics
Emotional intelligence and its relationship to leadership style Althoilahdrash field in the General Company for Cotton Industries
...Show More Authors

View Publication