Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that using mean absolute value (MAV), waveform length (WL), Wilson Amplitude (WAMP), Sine Slope Changes (SSC), and Cardinality features of the proposed algorithm achieves a classification accuracy of 89.6% when classifying seven distinct types of hand and wrist movement. Index Terms— Human Robot Interaction, Bio-signals Analysis, LDA classifier.
Active learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consis
... Show MoreThe research studied and analyzed the hybrid parallel-series systems of asymmetrical components by applying different experiments of simulations used to estimate the reliability function of those systems through the use of the maximum likelihood method as well as the Bayes standard method via both symmetrical and asymmetrical loss functions following Rayleigh distribution and Informative Prior distribution. The simulation experiments included different sizes of samples and default parameters which were then compared with one another depending on Square Error averages. Following that was the application of Bayes standard method by the Entropy Loss function that proved successful throughout the experimental side in finding the reliability fun
... Show MoreThe role of university in awareness of Social and Cultural Human Rights to Students
still at the beginnings . the irritable secure of Iraqi environment is the most challenges that
cease any work that may raise the human rights in university . in spite of obstacles the same
society of university like conferences and meetings that related to this subject . as well as the
luck of professional teachers.
This study raises a group of important questions, perhaps the most :
The contribution of university in educates their students of the social and cultural human
rights? What are the most challenges that facing these students? Does the university
responsible of this luck of understanding these human rights?
This Study
The Organizational Transparency is regarded one of the effective means in the attempts of the restoration and working to prevent the corruption and reduce the negative managerial economic social and political effects.
Accordingly, this study aims at importance of performing an explorative analytical study in order to stand on the effect of the Organizational Transparency in the reduction of environment of Iraqi Organizations.
To achieve this study, three hypotheses were chosen; the first is the correlation relation and the second is the effect and the third is the differences, and statistical means represented by correlation coefficient "Spearman", "", "Mann- Whit
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5- trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion (𝐶𝑂 ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional th
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5-trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion ( ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional theory (DFT) calcul
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More