Preferred Language
Articles
/
gBb4j4oBVTCNdQwCLZ_t
Improved hand prostheses control for transradial amputees based on hybrid of voice recognition and electromyography
...Show More Authors

The control of prostheses and their complexities is one of the greatest challenges limiting wide amputees’ use of upper limb prostheses. The main challenges include the difficulty of extracting signals for controlling the prostheses, limited number of degrees of freedom (DoF), and cost-prohibitive for complex controlling systems. In this study, a real-time hybrid control system, based on electromyography (EMG) and voice commands (VC) is designed to render the prosthesis more dexterous with the ability to accomplish amputee’s daily activities proficiently. The voice and EMG systems were combined in three proposed hybrid strategies, each strategy had different number of movements depending on the combination protocol between voice and EMG control systems. Furthermore, the designed control system might serve a large number of amputees with different amputation levels, and since it has a reasonable cost and be easy to use. The performance of the proposed control system, based on hybrid strategies, was tested by intact-limbed and amputee participants for controlling the HANDi hand. The results showed that the proposed hybrid control system was robust, feasible, with an accuracy of 94%, 98%, and 99% for Strategies 1, 2, and 3, respectively. It was possible to specify the grip force applied to the prosthetic hand within three gripping forces. The amputees participated in this study preferred combination Strategy 3 where the voice and EMG are working concurrently, with an accuracy of 99%.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Engineering Science And Technology, An International Journal
Thermal performance improvement based on the hybrid design of a heat sink
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Computer Science
VOICE ACTIVATION VISUALIZATION FOR ECHOCARDIOGRAPH AND 3D ANGIOGRAPHIC IMAGES IN SURGERY
...Show More Authors

In some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhan

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 09 2020
Journal Name
Article In Journal Of Engineering Science And Technology
English Numbers Recognition Based on Sign Language Using Line-Slope Features and PSO-DBN Optimization Method
...Show More Authors

View Publication
Scopus (2)
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Cascade position-torque control strategy based on function approximation technique (FAT) for flexible joint robots
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Multiple Voice narrative
...Show More Authors

With the shift of narration and the revolution against the traditional methods which were dominated by the authorial intrusion and the single narrative voice, there appeared new forms that go along with the change in methods of narration. Form becomes the representation which equips us to understand more fully aspects of existence outside of art. Form is the objectifying of idea, and its excellence depends upon its appropriateness to the idea.1 One of the most important approaches to writing fiction is the power of point of view.

In the strategy of 'point of view' lies the secret of art and, as Norman Friedman indicates, it provides a method for distinguishing the possible degrees of authorial extinction in the narrati

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Voice occasion in the hadith (Sahih Azkar) for example
...Show More Authors

Voice studies are one of the sensory studies of their first association with auditory taste, which broadcasts its connection to the most sensory point contained in the physical corners, and in order to satisfy our conscience from these fundamental voices, we searched for in modern contexts, high proportions related to the words of Muhammadiyah, so we are looking for (events In the hadiths of the Prophet (peace be upon him), to settle our journey when the true adhkaar received from the Prophet, peace be upon him, and to control us start a journey through which we repeat between the cities of audio repetitions, sometimes we find ourselves have stood at the entrance of what corresponds to the sounds between the title of the Hadith and its t

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
ESO-based repetitive control for rejecting periodic and aperiodic disturbances in piezoelectric actuators
...Show More Authors

This paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref