Prosthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR) material. All design and analysis are done in the program Solidwork 2018 to find the effect of different load conditions on the designed hand by adding (normal load, ball grasping, cylinder rising). The von- Mises stresses deducted for a fingertip and assembled finger as well as the assembled hand to identify the maximum stress accrues before failure in daily life functions.
The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
This paper aims to investigate the flexural behavior of reinforced concrete beams considering fire resistance by adding Lightweight Expanded Clay Aggregates (LECA) to the concrete mix as partial coarse aggregate replacement. LECA is a type of porous clay with a uniform pore structure with fine, closed cells and hard, tightly sintered skin. The experimental work comprised four reinforced self-compacted concrete beams. All the specimens were identical in their geometrical layout of 1600×240×200 mm, reinforcement details, and support condition (simply supported). For all the beams, the main reinforcement was provided by two bars, each having a diameter of 12 mm, while a bar of 6 mm diameter was employed for the top and shear reinforc
... Show MoreVirtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope. The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir
... Show MoreIben Katheer Al Dimashqi is considered among the eminent scholars in the eighth Hijri century / fourteenth Gregorian century. He acquired eminent academic and social standing. His book Albidaya Walnihaya is considered among the important historical sources. This book's study of the subject of commercial dealing methods clarifies that the commercial dealing methods dealt by the people throughout the successive historical eras were multiple, most prominent of which was money (whether Dirhams, Dinars, measures (mikyals), weights (like Sa') in addition to other means like usury. But here we notice that Iben Katheer stressed that usury must be prohibited because it is religiously forbidden and cited many Quranic verses and Prophetic sayings w
... Show MoreBackground: human paillomavirus infections (genital warts) are the most frequent sexually transmitted viral infections. a wide range of treatment options is available with different efficacy.
Objective: To evaluate the efficacy of podophyllin, trichloracetic acid (TCA) in the treatment of genital warts and side effects of them.
Subjects and methods: a total of sixty patients with genital warts were randomly selected, 30 in each group, in the Department of Dermatology, medical city for a Duration of 11 months from January 2009 to December 2009 treated with 35 % podophyllin in the tincture of benzoin or 50% TCA) .Forty-eight patients were followed up for three months.
Results: wart
... Show MoreThis research was one of the terms that used by Al-Bazzar in his musnad and this term was (Al-azza) who launched on some ways and hadiths and I collected those narration, and I have graduated and studied it to access to the meaning which Al-Bazzar want that from this description. In the introduction of the research, I have mention the importance of the subject and the reasons for his selection and also my plan, a preface where I mentioned the definition of Al-Bazzar and his musnad, then in the first section I defined Al-azza linguistically and idiomatically , the second section I studied the hadiths that Al-Bazzar described them with azza ,and then I conclude it with my results that I have reach
... Show More