Preferred Language
Articles
/
oxb9j4oBVTCNdQwCx5_c
Differences in EMG Feature Space between Able-Bodied and Amputee Subjects for Myoelectric Control
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
University Of Plymouth
Intrinsic Control Strategies for Herpesvirus-based Vaccine Vectors
...Show More Authors

Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Robust Computed Torque Control for Uncertain Robotic Manipulatorss
...Show More Authors

This paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem.  The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.

View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Modified Elman Spike Neural Network for Identification and Control of Dynamic System
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Psychophysiological Control in Behavior
...Show More Authors

         The Feedback Concept has been spread as an organized trend for scientific research since it has a significant importance for human behavior and how it has been directed and controlled by the individual, feedback has numerous definitions but the simplest definition is; feedback is the information received by the individual from the output of his behavior, In addition to the mutual relationship between the individual and the stimulation that provide him with the basic information by the biological control of his behavior, Since feedback cannot be accomplished without receiving information from the inner and outer environment, the biological and physiological information become the ma

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Saudi Med J
The frequency of 21-alpha hydroxylase enzyme deficiency and related sex hormones in Iraqi healthy male subjects versus patients with acne vulgaris
...Show More Authors

KE Sharquie, AA Noaimi, BO Saleh, ZN Anbar…, Saudi Med J, 2009 - Cited by 13

View Publication
Scopus (8)
Scopus
Publication Date
Fri Sep 18 2020
Journal Name
Hal Open Science
Adaptive Approximation Control of Robotic Manipulators: Centralized and Decentralized Control Algorithms
...Show More Authors

The regressor-based adaptive control is useful for controlling robotic systems with uncertain parameters but with known structure of robot dynamics. Unmodeled dynamics could lead to instability problems unless modification of control law is used. In addition, exact calculation of regressor for robots with more than 6 degrees of freedom is hard to be calculated, and the task could be more complex for robots. Whereas the adaptive approximation control is a powerful tool for controlling robotic systems with unmodeled dynamics. The local (partitioned) approximation-based adaptive control includes representation of the uncertain matrices and vectors in the robot model as finite combinations of basis functions. Update laws for the weighting matri

... Show More
View Publication
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref