Decoding transient sEMG data for intent motion recognition in transhumeral amputees
...Show More Authors
The aim of the research is a techno-economic analysis of the use of concentrated solar energy technologies in the Iraqi city, considering the concentrated solar energy technology is a renewable energy technology that derives its resources from the sun and is replenished at a rate that exceeds its use. It is also inexhaustible and environmentally friendly energy from its environmental footprint, unlike traditional fossil energy which produces greenhouse gases and a major cause of global warming.
This research measures the costs of concentrated solar energy technology to Reduce the effects caused by other energies and work to fill part of the shortfall in the total electricity production, even at a specific percentage, in preparati
... Show Morethe present study is designed to evaluate the effect of low level laser irradiation on the immume system when administere intravenoisly
Amebiasis, related to the pathogenic parasite Entamoeba histolytica, is a prominent cause of diarrhea globally. Amebiasis is primarily a disease of impoverished communities in developing nations, although it has recently arisen as a significant infection among returning tourists and immigrants. Severe cases are linked to a high case fatality rate. Although polymerase chain reaction (PCR)-based diagnosis is becoming more widely available, it is still underutilized. Treatment with nitroimidazoles is now suggested, however novel parasite medication research is a top priority. To avoid problems, amebiasis should be considered before corticosteroid therapy. Because there is no effective vaccination, sanitation and availability to clean w
... Show Moreدور اللوبي الصهيوني في صنع السياسة الأمريكية
In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show MoreAbstract ABSTRACT:BACKGROUND: Anterior cruciate ligament reconstruction (ACLR) is one of the most commonly performed orthopedic procedures. Technical factors especially correct tunnel placement play major role in its success. However its failure rate is still high (10%), and impingement of the graft on the posterior cruciate ligament (PCL) and the medial wall of the lateral femoral condyle is an important cause of failure. Wallplasty is a technique used to prevent graft impingement, but there is no consensus on its routine use.OBJECTIVE:Is to compare between the postoperative knee functional outcome and stability of arthroscopic ACLR performed with wallplasty versus those performed without wallplasty.PATIENTS AND METHODS: A prospective exp
... Show MoreThis literary review addresses the status of the most famous Israeli writer, Amos Oz, through the analysis of relevant articles that highlight various aspects of his literary and political orientations, reflecting his ideological and social background. Oz's literature encompasses a mix of political orientations that many critics view as extreme, while others see them as moderate stances indicative of the author's awareness. And these are what strengthened his literary status in modern Hebrew literature.These trends emphasized the contribution of Oz's works to shaping Israeli cultural consciousness and reflect the challenges facing identity in multiple contexts. He was an advocate for equality between Palestinians and Israelis and
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreDrama is one of the means of transmitting human experiences, as it presents within it the life ideas and visions of the spectator, who is subject to their influence on him, robbed of the will in front of its charm and various display arts, which invade him with its dimensions and affect his references, and this art form is based on stories revolving around personalities involved in events that have grown As a result of the struggle of two conflicting opponents, or two opposing forces or emotions generated as a result of a voluntary conflict, as this dramatic conflict represents the most important elements of those events, as it is embodied in an inevitable scene that emerges from other scenes, and this scene is sometimes subject to the
... Show More