Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that using mean absolute value (MAV), waveform length (WL), Wilson Amplitude (WAMP), Sine Slope Changes (SSC), and Cardinality features of the proposed algorithm achieves a classification accuracy of 89.6% when classifying seven distinct types of hand and wrist movement. Index Terms— Human Robot Interaction, Bio-signals Analysis, LDA classifier.
Electronic properties such as density of state, energy gap, HOMO (the highest occupied molecular orbital) level, LUMO (the lowest unoccupied molecular orbital) level and density of bonds, as well as spectroscopic properties like infrared (IR), Raman scattering, force constant, and reduced masses for coronene C24, reduced graphene oxide (rGO) C24O5and interaction between C24O5and NO2gas molecules were investigated. Density functional theory (DFT) with the exchange hybrid function B3LYP with 6-311G** basis sets through the Gaussian 09 W software program was used to do these calculations. Gaussian view 05 was em
... Show MorePhotodynamic Action (PDA) by using appropriate wavelength of irradiation conjugated with porphyrin derivatives is a powerful mechanism of tumor destruction. Hematoporphyrin derivative has been shown to selectively localize in neoplastic cells and then cause destruction of them by generation of singlet oxygen when activated by low power He-Ne laser. Light which used in this study has been emitting from this laser has a wavelength equal to 632.8 nm (red light). Doses of laser had been varied from 3.6 J/cm2 to 14.4 J/cm2 . The beam of laser adjusted with a modified tissue culture plate. Cell lines had exposed to Hematoporphyrin D (HpD) for 24 hours before Laser exposure, their concentrations were varied from 5 µg/ml to 80 µg/ml. Resu
... Show MoreBackground Over the past decade there has been a growing awareness of, and interest in, the trace element concentration differences between normal and diseased tissues. Significant changes in tissue concentrations of Zinc (Zn) and Copper (Cu) have been previously reported in inflammation and cancer of certain human tissues.
Aim:(1)To correlate between Zn and Cu concentrations and the histological picture of normal and certain inflamed human tissues, namely the gall bladder (GB) the vermiform appendix (VA), visceral adipose tissue (VAT) and subcutaneous adipose tissue (SAT). (2) to detect whether there is a difference in the above-mentioned parameters between VAT and SAT. (3) to obtain recordings for trace element levels in human tissu
In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MorePolarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomenon in the waveguide. The simulation results demonstrate a polarization co
... Show MorePolarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomeno
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More