Most below-knee prostheses are manufactured in Iraq without considering the fast progress in smart prostheses, which can offer movements in the desired directions according to the type of control system designed for this purpose. The proposed design appears to have the advantages of simplicity, affordability, better load distribution, suitability for subjects with transtibial amputation, and viability in countries with people having low socio-economic status. The designed prosthetics consisted of foot, ball, and socket joints, two stepper motors, a linkage system, and an EMG shield. All these materials were available in the local markets in Iraq. The experimental results showed that the maximum range of motion to move the designed prosthetic in the sagittal and frontal planes reached 70% of the healthy foot range of motion relative to the signals of the gastrocnemius muscle of a healthy leg person. The angles that represented the range of motion achieved in various directions at the ankle joint were Dorsiflexion Angle (35˚), Plantar Flexion Angle (25˚), Inversion Angle (20˚), and Eversion Angle (15˚).
Receive money laundering phenomenon of interest to researchers and scholars on different intellectual orientation of economic or political or other, as this process is gaining paramount importance in light of business and increase the number of banks in the province of Kurdistan of Iraq and Erbil in particular and in the presence of openness developments chaotic economic and there are no factors encourage money laundering operation because of the presence of the hidden economy and the weakness of the banking and legal measures to combat them, and on this basis there is a need to examine money laundering operation in the province of Arbil, to indicate the presence or absence of a money laundering operation in working in the provin
... Show MoreThe agricultural activity has a great significance in the all four dimensions of sustainable development. Firstly, the economic dimension which it contributes with the GDP, as well as, it is considered as an important source to attract the investment. Secondly, the environmental dimension which also contributes with conserving of the biodiversity, combating the desertification, and increasing the farmlands. Thirdly, for its role in the social dimension to achieve the food security, to eradicate the poverty, and providing jobs. Fourthly, toward the institutional dimension as well it is considered as a source that allows all people to participate effectively, and to exchange of the local and universal experiences and perspectives. For conf
... Show MoreQuality control charts are limited to controlling one characteristic of a production process, and it needs a large amount of data to determine control limits to control the process. Another limitation of the traditional control chart is that it doesn’t deal with the vague data environment. The fuzzy control charts work with the uncertainty that exists in the data. Also, the fuzzy control charts investigate the random variations found between the samples. In modern industries, productivity is often of different designs and a small volume that depends on the market need for demand (short-run production) implemented in the same type of machines to the production units. In such cases, it is difficult to determine the contr
... Show MorePeriodontitis is a chronic inflammation affecting the tooth-supporting periodontal tissues. It is diagnosed by measuring periodontal parameters. However, documenting this data takes effort and may not discover early periodontitis. Biomarkers may help diagnose and assess periodontitis. This study aimed to evaluate the potential diagnostic of the salivary tumor necrosis factor-α (TNF-α) and receptor-activator of nuclear factor ĸ-B-ligand (RANKL) in distinguishing between periodontitis and healthy periodontium.
The
Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance