This study aims to characterize traumatic spinal cord injury (TSCI) neurophysiologically using an intramuscular fine-wire electromyography (EMG) electrode pair. EMG data were collected from an agonist-antagonist pair of tail muscles of Macaca fasicularis, pre- and post-lesion, and for a treatment and control group. The EMG signals were decomposed into multi-resolution subsets using wavelet transforms (WT), then the relative power (RP) was calculated for each individual reconstructed EMG sub-band. Linear mixed models were developed to test three hypotheses: (i) asymmetrical volitional activity of left and right side tail muscles (ii) the effect of the experimental TSCI on the frequency content of the EMG signal, (iii) and the effect of an experimental treatment. The results from the electrode pair data suggested that there is asymmetry in the EMG response of the left and right side muscles (p-value < 0.001). This is consistent with the construct of limb dominance. The results also suggest that the lesion resulted in clear changes in the EMG frequency distribution in the post-lesion period with a significant increment in the low-frequency sub-bands (D4, D6, and A6) of the left and right side, also a significant reduction in the high-frequency sub-bands (D1 and D2) of the right side (p-value < 0.001). The preliminary results suggest that using the RP of the EMG data, the fine-wire intramuscular EMG electrode pair are a suitable method of monitoring and measuring treatment effects of experimental treatments for spinal cord injury (SCI).
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.
The term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n
... Show MoreIn this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.
The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing ope
... Show MoreThis paper deals with numerical study of the flow of stable and fluid Allamstqr Aniotina in an area surrounded by a right-angled triangle has touched particularly valuable secondary flow cross section resulting from the pressure gradient In the first case was analyzed stable flow where he found that the equations of motion that describe the movement of the fluid
We present a reliable algorithm for solving, homogeneous or inhomogeneous, nonlinear ordinary delay differential equations with initial conditions. The form of the solution is calculated as a series with easily computable components. Four examples are considered for the numerical illustrations of this method. The results reveal that the semi analytic iterative method (SAIM) is very effective, simple and very close to the exact solution demonstrate reliability and efficiency of this method for such problems.