S Khalifa E, N Adil A, AS Mazin M…, 2008
Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreBackground: The best material for dental implants is polyetherketoneketone (PEKK). However, this substance is neither osteoinductive nor osteoconductive, preventing direct bone apposition. Modifying the PEKK with bioactive elements like strontium hydroxyapatite is one method to overcome this (Sr-HA). Due to the technique's capacity to provide better control over the coating's properties, RF magnetron sputtering has been found to be a particularly useful technique for deposition.
Materials and methods : With specific sputtering conditions, the RF magnetron technique was employed to provide a homogeneous and thin coating on Polyetherketoneketone substrates.. the coatings were characterized by Contact angle, adhesion test, X-ray dif
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreAl-Naymi, N.A.Sh., H.A.S. AL-Nuaimi and M.R. Nashaat. 2022. Toxicity Stress of the Durah Power Plant Ash and its Effect on the Alga Chlorococcum humicola (Naeg) Rabenhorst 1868. Arab Journal of Plant Protection, 40(2): 188-192. https://doi.org/10.22268/AJPP-040.2.188192 This study illustrates the acute toxic effect of ash released from Durah power plant (DPP) on the biology of the phytoplankton species Chlorococcum humicola in Iraq. The results showed that the median lethal concentration for killing 50% of the Alga population (LC50) was 0.15 and 0.13 ppt (parts per thousand) for 24 and 48 hours exposure to crude ash concentrations, respectively. In contrast, no LC50 value was recorded for 72 and 96 hrs after exposure. The reduction
... Show MoreBackground: One of the most common problem associated with the used of soft denture lining material is microorganisms and fungal growth especially Candida albicans, which can result in chronic mucosal inflammation. The aim of this study was to evaluate the influence of chlorhexidine diacetate (CDA) salt Incorporation into soft denture lining material on antifungal activity; against Candida albicans, and the amount of chlorhexidine di-acetate salt leached out of soft liner/CDA composite. Furthermore, evaluate shear bond strength and hardness after CDA addition to soft liner Materials and methods: chlorhexidine diacetate salt was added to soft denture lining material at four different concentrations (0.05%, 0.1% and 0.2% by weight). Four hund
... Show More