Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (FSR) and vibro-motors in which the speed of these motors is proportional to the amount of the grasp force exerted by the prosthetic hand. Investigation for optimal placement of the FSRs on a prosthetic hand to obtain convenient haptic feedback has been carried out. The results show the effect of object shape and weight on the obtained response of the FSR and how they influence the locations of the sensors.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstracts:
The Central Bank is the backbone of the banking system as a whole, and in order to maintain the banking system, one of the most important functions that the Central Bank performs is the function of supervising and controlling banks, with several tools and methods, and one of the most important of these tools is its creation of the function of a compliance observer, which obligated commercial banks to appoint a person in A bank that performs this function according to certain conditions and granting it some powers that would build a sound and compliant banking system. The function of the compliance observer is to follow up on the bank’s compliance with the instructions and decisions issued by
... Show MoreAn Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to
... Show MoreGold nanoparticles AuNPs have proven to be powerful tools in various nanomedicine applications, because of their photo-optical distinctiveness and biocompatibility. Noble metal gold nanoparticles was prepared by pulsed laser ablation method (1064-Nd: YAG with various Laser power from 200 to 800 mJ and 1 Hz frequency) in distil water. The process was characterized using UV-VIS absorption spectroscopy. Morphology and average size of nanoparticles were estimated using AFM and X-ray diffraction (XRD) analysis which show the nature of gold nanoparticles (AuNPs). Antibacterial activity of gold nanoparticles as a function of particles concentration against gram negative bacterium Escherichia coli and gram positive bacterial Staphylococcus aureu
... Show MoreMicrobial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex
Fabrication of a photodetector consists of the conjugated polymer "MEH-PPV"- poly (2-methoxy-5-(2'-ethylhexyloxy)-1,4-phenlenevinylene) and MEH-PPV:MWCNT nanocomposite thin film. The volume ratio investigated was 0.75:0.25. MEH-PPV was dissolved in chloroform solvent and doped with MWCNTs. The spin coating method was used to achieve a facile and low cost photodetector. The absorption spectrum decreases by adding the CNTs. The PL spectrum detected recombination curve results by doping the polymer with CNTs, and AFM measurement showed an increase of roughness average from (0.168 to 2.43nm) of "MEH-PPV" and "MEH-PPV:CNTs", respectively. The doping ratio 0.25, which has a higher photoresponsivity, was evaluated at 1.70 A/W and 2.14 A/W of th
... Show MoreContinuous turbidimetric analysis (CTA) for a distinctive analytical application by employing a homemade analyser (NAG Dual & Solo 0-180°) which contained two consecutive detection zones (measuring cells 1 & 2) is described. The analyser works based on light-emitting diodes as a light source and a set of solar cells as a light detector for turbidity measurements without needing further fibres or lenses. Formation of a turbid precipitated product with yellow colour due to the reaction between the warfarin and the precipitation reagent (Potassium dichromate) is what the developed method is based on. The CTA method was applied to determine the warfarin in pure form and pharmaceu