Preferred Language
Articles
/
rxb-j4oBVTCNdQwC6p-4
Real-time classification of shoulder girdle motions for multifunctional prosthetic hand control: A preliminary study
...Show More Authors

In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the shoulder girdle motions for high-level upper limb motions with 88.4% average classification accuracy for four intact-limbed subjects and 92.8% classification accuracy for one amputee by combining electromyography and accelerometer channels. The outcomes of this study may suggest that the proposed pattern recognition system can help to provide control signals to drive a prosthetic arm for high-level upper limb amputees.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Building a Three-Axis CNC Milling Machine Control System
...Show More Authors

CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 27 2024
Journal Name
Journal Of Applied Mathematics And Computational Mechanics
Fruit classification by assessing slice hardness based on RGB imaging. Case study: apple slices
...Show More Authors

Correct grading of apple slices can help ensure quality and improve the marketability of the final product, which can impact the overall development of the apple slice industry post-harvest. The study intends to employ the convolutional neural network (CNN) architectures of ResNet-18 and DenseNet-201 and classical machine learning (ML) classifiers such as Wide Neural Networks (WNN), Naïve Bayes (NB), and two kernels of support vector machines (SVM) to classify apple slices into different hardness classes based on their RGB values. Our research data showed that the DenseNet-201 features classified by the SVM-Cubic kernel had the highest accuracy and lowest standard deviation (SD) among all the methods we tested, at 89.51 %  1.66 %. This

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of external audit in banking risk management: A typical framework for control testing and banking risk assessment
...Show More Authors

Banks face many of the various risks: which are of dangerous phenomena that cause the state achieved a waste of money and a threat to future development plans to be applied to reach the goals set by: prompting banks and departments to find appropriate solutions and fast: and it was within these solutions rely on Banking risk management and effective role in defining and identifying: measuring and monitoring risk and trying to control and take risks is expected to occur in order to encircle and make it in within acceptable limits: and try to avoid them in the future to reduce the losses that are likely to be exposed to the bank: and it began to emerge and dominate a lot of legislation that seeks to structure the year risk management and t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2011
Journal Name
Thesis
Performance Analysis of a New Compact Magneto-Rheological Proportional Control Valve for Hydraulic Actuation Using FEM and Experimental Approach
...Show More Authors

One of the main parts in hydraulic system is directional control valve, which is needed in order to operate hydraulic actuator. Practically, a conventional directional control valve has complex construction and moving parts, such as spool. Alternatively, a proposed Magneto-rheological (MR) directional control valve can offer a better solution without any moving parts by means of MR fluid. MR fluid consists of stable suspension of micro-sized magnetic particles dispersed in carrier medium like hydrocarbon oil. The main objectives of this present research are to design a MR directional control valve using MR fluid, to analyse its magnetic circuit using FEMM software, and to study and simulate the performance of this valve. In this research, a

... Show More
Publication Date
Tue Dec 01 2020
Journal Name
Systematic Reviews In Pharmacy
Synthesis And Preliminary Antimicrobial Evaluation Of Schiff Bases Of N -Benzyl Isatin Derivatives
...Show More Authors

Isatin (1H-indole-2, 3-dione) and its analogs are an important class of heterocyclic compounds. N-benzyl isatins and Schiff bases of isatin analogs have been reported to demonstrate a variety of biological activities. This work illustrates the synthesis of new N-benzylisatin Schiff bases and studies their biological activity. Firstly, Isatin and its analogs; 5-methoxyisatin, 5-fluoroisatin reacted with benzyl iodide to obtain N-benzylated derivatives of isatins 2 (ac). Secondly, these compounds were reacted with different amines (sulphanilamide and 4-methyl sulphonyl aniline) separately, to obtain Schiff bases compounds 3 (ac) and 4 (ac), respectively. The synthesized compounds were characterized by using FT-IR and 1HNMR spectroscopy. The s

... Show More
Publication Date
Sat May 27 2017
Journal Name
Journal Of Pharmaceutical Sciences And Research
Synthesis, Preliminary Antimicrobial Evaluation and Molecular Docking of new Schiff bases of Ceftizoxime
...Show More Authors

Schiff bases of Ceftizoxime sodium were synthesized in an attempt to improve the antimicrobial spectrum of Ceftizoxime. Aminothiazole ring of Ceftizoxime is linked directly through an imino group to different aromatic aldehydes reacted by nucleophilic addition using trimethylamine (TEA), as a catalyst and refluxed in methanol. The antimicrobial activity was evaluated for such Schiff bases using disc diffusion method. Molecular docking was conducted on certain penicillin-binding proteins (PBPs) and carboxypeptidases using 1- click docking software. Schiff bases of Ceftizoxime were prepared with reasonable yields and their chemical structures were confirmed by spectral analysis (FTIR, 1H-NMR) and elemental microanalysis (CHNS). The antibacter

... Show More
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Synthesis and Preliminary Antimicrobial Activity Evaluation of New Amide Derivatives of 2-aminobenzothiazole
...Show More Authors

Preview PDF
Scopus (6)
Scopus