This paper deals with calculate stresses in Knee-Ankle-Foot-Orthosis as a result of the effect vibration during gait cycle for patient wearing KAFO .Experimental part included measurement interface pressure between KAFO and leg due to action muscles and body weigh on Orthosis. also measurement acceleration result from motion of defected leg by accelerometer .Results of Experimental part used input in theoretical part so as to calculate stresses result from applying pressure and acceleration on KAFO by engineering analysis program ANSYS 14.Resultes show stresses values in upper KAFO greater than lower KAFO that is back to muscles more effective in thigh part lead to recoding pressure higher than pressure in shank part.
In this study, the synoptic analysis of dust storm for spring and summertime in Iraq were investigated. The images for dust provided by NASA are used to emphasize the dust storm days, while the composite maps of wind vector and geopotential 850hPa are mapped to investigate the pressure and wind direction patterns appearing with the dust condition in the same days. Spring has more dust frequency than summertime, especially in May. The frontal type of dust storm is dominant on spring, the cold air pushes the warm air that picking up the sand to the air through the vertical wind, but the southwestern high-speed wind and drought condition were controlled on the dust in summer. The northwestern wind is the main factor that carries the dust for l
... Show MoreThe purpose of this paper is to present an approach to compute accurately the distributions of the frictional heat generated, contact pressure and thermal stresses at any instant during the sliding period (heating phase) of the single-disc friction clutch system works in the dry condition and the complex interaction among them.
Numerical work was achieved using the developed elastic and thermal finite element models (axisymmetric models) to simulate the engagement of the single-disc friction clutch system.
Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature) targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a
... Show MorePVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreCholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.
This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).
In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More