about.jpg

Filter by

Decoding arm kinematics from EMG signals using Kalman filter

Myoelectric control of prosthetic arms provides a new hope for providing naturalistic movements to amputees. Extensive work has been made in recent years to use Electromyography (EMG) signals to enhance the operation of prosthetic arms. In this paper, we propose an EMG Kalman filter-based model, where we identify the relationship between the joint angles and recorded EMG signals. EMG signals were

Artificial Intelligence

A Context Integrated Model for Multi-label Emotion Detection

This paper explores the impact of taking the environment within which a tweet is made, on the task of analyzing sentiment orientations of tweets produced by people in the same community. The paper proposes C-GRU (Context-aware Gated Recurrent Units), which extracts the contextual information (topics) from tweets and uses them as an extra layer to determine sentiments conveyed by the tweet. The

Artificial Intelligence

Replay attack on lightweight CAN authentication protocol

Day after day, users' expectations of tomorrow vehicles' features are increasing. Although the industry's prime goal is users' satisfaction, many unsolved problems are still present. Amongst the major challenges are the huge interconnections and dependability within the Electronic Control Unit (ECU) used inside vehicles. Five years ago, the number of ECUs within a vehicle was about 70 ECUs. This

Circuit Theory and Applications
Software and Communications

Combining lexical features and a supervised learning approach for arabic sentiment analysis

The importance of building sentiment analysis tools for Arabic social media has been recognized during the past couple of years, especially with the rapid increase in the number of Arabic social media users. One of the main difficulties in tackling this problem is that text within social media is mostly colloquial, with many dialects being used within social media platforms. In this paper, we

Artificial Intelligence
Software and Communications

An energy-efficient multiobjective scheduling model for monitoring in internet of things

To ensure robustness in wireless networks, monitoring the network state, performance and functioning of the nodes and links is crucial, especially for critical applications. This paper targets Internet of Things (IoT) networks. In the IoT, devices (things) are vulnerable due to security risks from the Internet. Moreover, they are resource-constrained and connected via lossy links. This paper

Enterprise WLAN security flaws current attacks and relative mitigations

The Increasing number of mobiles and handheld devices that allow wireless access to enterprise data and services is considered a major concern for network designers, implementers and analysts. Enhancements of wireless technologies also accelerate the adoptions of enterprise wireless networks that are widely deployed solely or as an extension to existing wired networks. Bring Your Own Device is an

Artificial Intelligence

Modified methods for solving two classes of distributed order linear fractional differential equations

This paper introduces two methods for the numerical solution of distributed order linear fractional differential equations. The first method focuses on initial value problems (IVPs) and based on the αth Caputo fractional definition with the shifted Chebyshev operational matrix of fractional integration. By applying this method, the IVPs are converted into simple linear differential equations which

Circuit Theory and Applications

Hybrid Information Filtering Engine for Personalized Job Recommender System

The recommendation system, also known as recommender system or recommendation engine/platform, is considered as an interdisciplinary field. It uses the techniques of more than one field. Recommender system inherits approaches from all of machine learning, data mining, information retrieval, information filtering and human-computer interaction. In this paper, we propose our value-added architecture

Artificial Intelligence

FPGA realization of speech encryption based on modified chaotic logistic map

This paper presents an FPGA design and implementation of a chaotic speech encryption and decryption system based on bit permutations. Different encryption schemes are realized and compared. In addition, various testing methods including entropy, mean squared error, and correlation coefficients are used to analyze the efficiency of the system. The techniques for area and delay minimization are used

Circuit Theory and Applications
Software and Communications

Multi-switching master–slave synchronization of non-identical chaotic systems

This paper investigates the multi-switching master–slave synchronization of non-identical chaotic systems in which state variables of a master system are synchronized with different state variables of a slave system using the sliding mode control technique. To design the appropriate controllers via sliding mode control for different switches, Lyapunov stability theory is taken into account

Circuit Theory and Applications
Innovation, Entrepreneurship and Competitiveness