Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that using mean absolute value (MAV), waveform length (WL), Wilson Amplitude (WAMP), Sine Slope Changes (SSC), and Cardinality features of the proposed algorithm achieves a classification accuracy of 89.6% when classifying seven distinct types of hand and wrist movement. Index Terms— Human Robot Interaction, Bio-signals Analysis, LDA classifier.
Semiconductor quantum dots (QDs) have attracted tremendous attentions for their unique characteristics for solid-state lighting and thin-film display applications. A simple chemical method was used to synthesis quantum dots (QDs) of zinc sulfide (ZnS) with low cost. The XRD) shows cubic phase of the prepared ZnS with an average particles size of (3-29) nm. In UV-Vis. spectra observed a large blue shift over 38 nm. The band gaps energy (Eg) was 3.8 eV and 3.37eV from the absorption and photoluminescence (PL) respectively which larger than the Eg for bulk. QDs-LED hybrid devices were fabricated using ITO/ PEDOT: PSS/ Poly-TPD/ ZnS-QDs/ with different electron transport layers and cathode of LiF/Al layers. The EL spectrum reveals a bro
... Show MoreCryptosporidiosis is an intestinal protozoan parasitic disease that infects human and animals, caused by apicomplexan parasite belong to the genusof Cryptosporidium. The current study was done to record the infection rate of cryptosporidiosis in human and cattle, and genotype the clinical isolates of Cryptosporidium in Baghdad Province. A total of 265 stool sample were collected (150 from human and 115 from cattle) during the period from December 2016 to the May 2017. Cryptosporidial infection was detected using modified acid fast stain. DNA of the parasite was extracted from oocysts of positive fecal samples and nested PCR method was used for partial 60 kDa glycoprotein (gp60) gene amplification then sequence analysis for selected samples.
... Show MoreSTAG3 is the meiotic component of cohesin and a member of the Cancer Testis Antigen (CTA) family. This gene has been found to be overexpressed in many types of cancer, and recently, its variants have been implicated in other disorders and many human diseases. Therefore, this study aimed to analyze the major variants of STAG3. Western blot (WB) and immunoprecipitation (IP) assays were performed using two different anti-STAG3 antibodies that targeted the relevant protein in MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 breast cancer cells with Jurkat and MCF-10A cells as positive and negative controls, respectively. In silico analyses were searched to study the major isoforms. WB and IP assays revealed two abundant polypeptides < 191 kDa and
... Show MoreIn this work, the elemental constituents of smoker and nonsmoker
teeth samples of human were analyzed by Laser induced breakdown
spectroscopy method (LIBS). Many elements have been detected in
the healthy teeth samples, the important once are Ca, P, Mg, Fe, Pb
and Na. Many differences were found between (female and male)
teeth in Ca, P, Mg, Na and Pb contents. The concentrations of most
toxic elements were found significantly in the smoker group. The
maximum concentrations of toxic elements such as Pb, Cd and Co
were found in older male age above 60 year. Also, it was found that
the minimum concentrations of trace elements such as Ca, P and Na
exist in this age group. From these results it is clear that the
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More