In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi
... Show MoreThe - mixing ratios of -transitions from levels in populated in the reactions are calculated in present work using - ratio, constant statisticalTensor and least squares fitting methods The results obtained are in general, in good agreement or consistent, within the associated uncertainties, with these reported in Ref.[9],the discrepancies that occurs are due to inaccuracy existing in the experimental data The results obtained in the present work confirm the –method for mixed transitions better than that for pure transition because this method depends only on the experimental data where the second method depends on the pure or those considered to be pure -transitions, the same results occur in – method
استهدف البحث تشخيص وتحليل الاسباب التي تجعل المرأة العراقية أكثر تأثراً من الرجل بعوامل التغيرات المناخية، فضلاً عن زيادة الوعي بقضية المرأة في هذا المجال، لأن موضوع دمجها في صياغة السياسات والاستراتيجيات المتعلقة بالتغير المناخي أصبح قضية عالمية، ويحتل مرتبة متقدمة في مؤشرات تحقيق أهداف التنمية المستدامة، وأستخدمت الباحثة المنهج الوصفي والتحليلي والاحصائي في تحليل محاور البحث، وتوصل البحث الى إستن
... Show MoreThis study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreEnvironmental factors that damage plant cells by dehydrating them, such cold, drought, and high salinity, are the most common environmental stresses that have an impact on plant growth, development, and productivity in cultivated regions around the world. Several types of plants have several drought, salinity, and cold inducible genes that make them tolerant to environmental challenges. The purpose of this study was to investigate several species in
Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More