Surface electromyography (sEMG) and accelerometer (Acc) signals play crucial roles in controlling prosthetic and upper limb orthotic devices, as well as in assessing electrical muscle activity for various biomedical engineering and rehabilitation applications. In this study, an advanced discrimination system is proposed for the identification of seven distinct shoulder girdle motions, aimed at improving prosthesis control. Feature extraction from Time-Dependent Power Spectrum Descriptors (TDPSD) is employed to enhance motion recognition. Subsequently, the Spectral Regression (SR) method is utilized to reduce the dimensionality of the extracted features. A comparative analysis is conducted between the Linear Discriminant Analysis (LDA) classifier and a Deep Learning (DL) approach employing the Long Short-Term Memory (LSTM) classifier to evaluate the classification accuracy of the different motions. Experimental results demonstrate that the LSTM classifier outperforms the LDA-based approach in gesture recognition, thereby offering a more effective solution for prosthesis control.
Floods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.
The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result
In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreThis paper demonstrates the construction designing analysis and control strategies for fully tracking concentrated solar thermal by using programmable logic control in the city of Erbil-Iraq. This work used the parabolic dish as a concentrated solar thermal. At the focal point, the collected form of energy is used for heating a (water) in the receiver, analyzing this prototype in real-time with two different shapes of the receiver and comparing the results. For tracking the parabolic dish, four light-dependent resistors are used to detect the sun's position in the sky so that the tracking system follows it to make the beam radiation perpendicular to the collector surface all of the time during the day for maximum solar p
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreUsing a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show MoreIn this paper , concrete micro-piles were used to improve the bearing capacity of the soil which is supporting the shallow foundation by using groups of (4; 6 and 9)bored short micro-piles which have, (D=0.125m and D=0.1m), and length to diameter ratio (L/D) equal to (6; 10 and 12) respectively. To calculate the bearing capacity of the micro-piles,(Tomlinson) and (Lamda) methods were used; also the soil properties were taken from Al-Muthana airport,(Al-Qyssi,2001) [1]. The results show that; increasing the number of piles and/ or the diameters and lengths; and the interaction between the bearing capacity of the shallow foundation with the bearing capacity of the pile group which leads to increasing the strength against the external loads
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
The aim of this study is to evaluate in-vitro activity of Cefamandol (Cfm) and Ceftazidime (Cfz), in combination with Clavulanic acid (CA) against ten complicated multiresistant uropathogenic E.coli .One hundred clinical strains were isolated from patients with chronic urinary tract infections (UTIs), these isolates were identified by the Api identification systems. The antimicrobial susceptibility tests were determined by Kirby-Bauer method, all of them were sensitive to Imipenem (Imp). Ten strains were chosen for the present study, they were resistant to Ampicillin (Amp), Amoxicillin (Amo), Carbenicillin (Cb), Ticarcillin (Tic), Azlocillin (Azl), Amoxicillin\ Potassium Clavulanate {Augmentin(Amc)}, (Amo\CA), Ticarcillin\ Potas
... Show More