Lower extremity exoskeletons can assist with performing particular functions such as gait assistance, and physical therapy support for subjects who have lost the ability to walk. This paper presents the analysis and evaluation of lightweight and adjustable two degrees of freedom, quasi-passive lower limb device to improve gait rehabilitation. The exoskeleton consists of a high torque DC motor mounted on a metal plate above the hip joint, and a link that transmits assistance torque from the motor to the thigh. The knee joint is passively actuated by spring installed parallel with the joint. The action of the passive component (spring) is combined with mechanical output of the motor to provide a good control on the designed exoskeleton while walking. The results show that muscles' efforts on both the front and the back sides of the user's leg were decreased when walking using the exoskeleton with the motor and spring.
Protein arginine methyltransferases (PRMTs) play important roles in transcription, splicing, DNA damage repair, RNA biology, and cellular metabolism. Thus, PRMTs have been attractive targets for various diseases. In this study, we reported the design and synthesis of a potent pan-inhibitor for PRMTs that tethers a thioadenosine and various substituted guanidino groups through a propyl linker. Compound II757 exhibits a half-maximal inhibition concentration (IC50) value of 5 to 555 nM for eight tested PRMTs, with the highest inhibition for PRMT4 (IC50 = 5 nM). The kinetic study demonstrated that II757 competitively binds at the SAM binding site of PRMT1. Notably, II757 is selective for PRMTs over a panel of other methyltransferases, w
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreMost of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.
Background: One of the most common problems that encountered is postburn contracture which has both functional and aesthetic impact on the patients. Various surgical methods had being proposed to treat such problem. Aim: To evaluate the effectiveness of square flap in management of postburn contracture in several part of the body. Patients and methods: From April 2019 to June 2020 a total number of 20 patients who had postburn contracture in various parts of their body were subjected to scar contracture release using square flap. The follow up period was ranging between 6 months to 12 months. Results: All of our patients had achieved complete release of their band with maximum postoperative motion together with accepted aesthetic outcome. A
... Show MoreThermal properties of soils are important in buried structures contact problems. Although laboratory is distinctly advantageous in measuring the thermal conductivity of soil under ideal condition, given the ability to simulate relatively large-scale in place of soil bed, the field thermal conductivity of soil is not yet commonly used in many types of research. The use of only a laboratory experiment to estimate thermal conductivity may be the key reason for overestimation or underestimation it. In this paper, an intensive site investigation including field thermal conductivity tests for six different subsoil strata were performed using a thermal probe method (TLS-100) to systematically understanding the effects of field dry density, water c
... Show MoreBackground: Titanium implant is widely used in dentistry because of its extraordinary biocompatibility and mechanical properties. To increase bone–implant connection and provide early loading after placement, implant is stored in different storage medium and treated with UV light. Both of them are applicable methods to increase the bioactivity of titanium and overcome the biological aging. This study was designed to assess the effect of vacuum storage method and air storage with and without UV light treated of Cp Ti implant mechanically and histologically. Materials and methods: Titanium screws were acid etched and prepared in four different modes using different storage methods (air or vacuum and, with or without UV treatment. The implan
... Show MoreThe impact of exposure to different sizes of particulate matter (PM1, PM2.5, PM7, and PM10) was evaluated in Babylon concrete plant workers who had been exposed to concrete dust for at least 10 years. The effects of these particles on the hematological parameters, malondialdehyde (MDA) levels, and antioxidant enzymes (catalase and glutathione peroxidase ) were examined. The results exhibited that the levels of PM2.5 and PM10 were higher than the acceptable limits approved by the National Ambient Air Quality Standards (NAAQS). The blood parameters, namely white blood cells (WBC), red blood cell (RBC) and platelets counts, demonstrated non-significant differences between workers exposed to the PM as compared to the control gro
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More