Preferred Language
Articles
/
alkej-687
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of  under actuated system. The used motor is 6V Polulu high-power carbon brush micro metal gearmotor with gear ratio equal to 50:1. The motor was chosen due to its compactness and cheapness. The hand manufacturing process was done using  a 3D printer and using polylactic acid material. Numbers of experiments were accomplished using the designed hand for gripping objects. Initially, the electromyography signal (EMG) was recorded when the muscle contracted in one second, two seconds, three seconds. The synthetic hand was able to produce a range of gestures and grasping for objects.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 04 2025
Journal Name
Microbes And Infectious Diseases
A preclinical evaluation of the response of repairing the DNA of MCF7 breast cancer cells after exposure to probiotic bacteria
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 21 2021
Journal Name
Journal Of Engineering Mathematics
Fluid inflow from a source on the base of a channel
...Show More Authors

View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program to Improve some Aspects of Sensory Integration Disorder and Its Effect on Self-Direction Among a Sample of Children with Intellectual Disabilities
...Show More Authors

The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Solving Linear Volterra – Fredholm Integral Equation of the Second Type Using Linear Programming Method
...Show More Authors

In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree  and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Nov 30 2019
Journal Name
Journal Of Engineering And Applied Sciences
Using Particle Swarm Optimization Algorithm to Address the Multicollinearity Problem
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Biannual Journal By Department Of Linguistic And Translation Studies In Bayt Al Hikma
Metaphorical meaning of parts of the human body in Russian
...Show More Authors

This article discusses some of the metaphorical use of language units. Here we will define the basic concepts and underline the causes of this phenomenon. Through research it is proven that through the application of names of some body parts achieves the variety of metaphorical meanings.

Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Inhibitory Effect of Gallic Acid on Human Serum Cholinesterase
...Show More Authors

The dried fruit peel of pomegranate in Punicaceae family was fractionated chromatographically on Sephadex-LH-20 column .Gallic acid (trihydroxybenzoic acid) and its related galloyl esters such as gallotannin(i.e. β-penta-O-galloyl–D-glucose) were obtained homogenously. Different concentrations of gallic acid and gallotannin  were used to determine their inhibitory effect on human serum cholinesterase. The enzyme activity was measured according to the method reported by the WHO .The inhibitory effect of these compounds  on the activity of human serum cholinesterase have been studied in vitro .The inhibitory effect was remarkably clear with increasing concentration of gallic acid .Whereas galloyl ester showed n

... Show More
View Publication Preview PDF
Crossref