In this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic modulus of 4.021 GPa, while for the G group, these values are 12.75 MPa, 18.84 MPa, and 4.076 GPa, respectively. The fatigue test was used to evaluate the failure characteristics of the socket. An F-socket was utilized to test the interface compression between both the limb and the socket. For the Tekscan sensor, the calculated pressure in the medial region is 350 K Pa, while it is 330 KPa in the posterior region. Solid Works software was used to draw a prosthetic socket for the numerical study. The failure safety agent for the composite material for group Y was 1.26. The finite element method (ANSYS Workbench 14.5) was used to look at the fatigue characteristics to detect the maximum stress, safety factor, and total deformation.
This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreAbstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreThe theatre costume with the rest of the theatre show elements constitute a system of the meaning relations that produce a visual image that helps the recipient to decipher the theatre scene, let alone the manifestation of time in its levels (past, present, future) through the design construction of the theatre elements among which is the theatre costume. In order to know the way of manifesting time through the formulation of the theatre costumes, the research question has been put as follows: how to manifest time through the design construction for the theatre costumes unit, from which the research objective is derived as follows: Revealing the possibility of the designing unit of the costumes in manifesting the levels of time wit
... Show MoreInvasomes are newly developed types of nanovesicles. A vesicular drug delivery system is considered one of the approaches for transdermal delivery to enhance permeation and improve drug bioavailability. Ondansetron is a serotonin receptor antagonist used for treating vomiting associated with different clinical cases. The study aimed to prepare invasomal dispersions for improving permeation of ondansetron across the skin with a controlled release pattern. Twenty-seven formulas of ondansetron-loaded invasomes were prepared by a modified mechanical dispersion method. These formulas were optimized by studying the effect of variables on entrapment efficiency. Vesicle size, polydispersity, zeta potential, in-vitro release and ex-vivo perm
... Show MoreIn this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
Antibiotics are essential for treating infectious diseases, but their overuse and adverse effects are raising concerns about global public health. The pervasiveness of antibiotic contamination in aquatic environments has drawn increased attention in recent years. The primary concern regarding the release of antibiotics into the environment is the potential for microorganisms to become resistant to antibiotics. This review article summarizes the analytical methods used to determine the presence of trimethoprim and metronidazole in various environmental samples. These antibiotics have traditionally been analyzed using tandem mass spectrometry or high-performance liquid chromatography coupled to mass spectrometry; fluorescence or ultrav
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More