The control of prostheses and their complexities is one of the greatest challenges limiting wide amputees’ use of upper limb prostheses. The main challenges include the difficulty of extracting signals for controlling the prostheses, limited number of degrees of freedom (DoF), and cost-prohibitive for complex controlling systems. In this study, a real-time hybrid control system, based on electromyography (EMG) and voice commands (VC) is designed to render the prosthesis more dexterous with the ability to accomplish amputee’s daily activities proficiently. The voice and EMG systems were combined in three proposed hybrid strategies, each strategy had different number of movements depending on the combination protocol between voice and EMG control systems. Furthermore, the designed control system might serve a large number of amputees with different amputation levels, and since it has a reasonable cost and be easy to use. The performance of the proposed control system, based on hybrid strategies, was tested by intact-limbed and amputee participants for controlling the HANDi hand. The results showed that the proposed hybrid control system was robust, feasible, with an accuracy of 94%, 98%, and 99% for Strategies 1, 2, and 3, respectively. It was possible to specify the grip force applied to the prosthetic hand within three gripping forces. The amputees participated in this study preferred combination Strategy 3 where the voice and EMG are working concurrently, with an accuracy of 99%.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show MoreCNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
The goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch
... Show MoreQuality control charts are limited to controlling one characteristic of a production process, and it needs a large amount of data to determine control limits to control the process. Another limitation of the traditional control chart is that it doesn’t deal with the vague data environment. The fuzzy control charts work with the uncertainty that exists in the data. Also, the fuzzy control charts investigate the random variations found between the samples. In modern industries, productivity is often of different designs and a small volume that depends on the market need for demand (short-run production) implemented in the same type of machines to the production units. In such cases, it is difficult to determine the contr
... Show MorePeriodontitis is a chronic inflammation affecting the tooth-supporting periodontal tissues. It is diagnosed by measuring periodontal parameters. However, documenting this data takes effort and may not discover early periodontitis. Biomarkers may help diagnose and assess periodontitis. This study aimed to evaluate the potential diagnostic of the salivary tumor necrosis factor-α (TNF-α) and receptor-activator of nuclear factor ĸ-B-ligand (RANKL) in distinguishing between periodontitis and healthy periodontium.
The
This study was conducted to evaluate the efficacy of 6 isolates of Pseudomonas fluorescens and Trichoderma harzianum and there combination against Fusarium tomato wilt disease caused by Fusarium oxysporum F.sp. Lycopersisi under green house condition .The isolates of bacteria (B3) and Trichoderma (T1) were found to be highly effective in reducing the disease incidence to 13.3% , 21% respectively , compared to control treatment (40%).Furthermore, disease severity was reduced to 28 and 30% respectively in comparison to control (90%) .Colonization of the roots (cfu /g fresh root weight )by the two isolates whether alon or together was extremely high . The combination treatment had a high ability in reducing disease incidenece and sev
... Show MoreLafutidine (LAF) a newly developed histamine H2-receptor antagonist with absorption window makes it a good candidate to be prepared as floating drug delivery system. The current study involves formulation and in- Vitro evaluation of lafutidine as floating microspheres. Different formulation variables that affect the physicochemical properties of the prepared microspheres besides to the drug release behavior were investigated. Fourteen formulas were prepared by emulsion (o/w) solvent evaporation method using Ethyl cellulose (EC) as the polymeric matrix and tween 80 (TW80) as an emulsifying agent. The prepared formulas were evaluated for their percentage buoyancy (%), Percentage yield (%) and Entrapment efficiency (EE %). The results obt
... Show More