Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors
The aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t
... Show MoreThis study examines patterns of exposure of Iraqi university students to selective daily Iraqi newspapers and the motives of this exposure, as well as its associated factors that affect the average exposure. It tries to answer several questions, including those related to the levels of exposure of Iraqi university students to daily Iraqi newspapers and classification of patterns of selective exposure to daily Iraqi newspapers and the most prominent Iraqi daily newspapers that are selectively exposed by Iraqi university students. It also examines the motives of this selective exposure and factors that increase the degree of exposure to the daily Iraqi newspapers, and the most prominent stages in which Iraqi university students find their
... Show MoreThe special core analysis tests were accomplished on a set of core plugs for Mishrif Formation (mA, mB1, and mB2cde/mC units) in West Qurna/1 oilfield, southern Iraq. Oil relative permeability (Kro) data and the Corey-type fit of the data as functions of the brine saturation at the core outlet face for individual samples in the water-oil imbibition process to estimate relative permeability measurements by the centrifuge method were utilized. Identical correlations for oil and water relative permeabilities were extracted by steady-state and unsteady-state methods. For the mA samples, the gas-water capillary pressure curves were within a narrow range (almost identical) indicating that mA is a homogeneous unit. Kro curves for thr
... Show MoreThe special core analysis tests were accomplished on a set of core plugs for Mishrif Formation (mA, mB1, and mB2cde/mC units) in West Qurna/1 oilfield, southern Iraq. Oil relative permeability (Kro) data and the Corey-type fit of the data as functions of the brine saturation at the core outlet face for individual samples in the water-oil imbibition process to estimate relative permeability measurements by the centrifuge method were utilized. Identical correlations for oil and water relative permeabilities were extracted by steady-state and unsteady-state methods. For the mA samples, the gas-water capillary pressure curves were within a narrow range (almost identical) indicating that mA is a homogeneous unit. Kro curves for three mB2
... Show MoreA simple, rapid and environmentally friendly dispersive liquid–liquid microextraction method-based spectrophotometric method for the trace determination of folic acid has been developed. The proposed method is based on the formation of a deep yellow product via reaction of folic acid and 1,2-naphthoquine-4-sulfonate at pH = 9. The formed complex was extracted using a mixture of chloroform and ethanol. Then, the tiny organic droplets were measured at λ = 520 nm. At the optimum conditions, linearity was ranged from 0.05 to 1.5 μg/mL for the standard and samples, with a linear correlation coefficient of 0.9996. The detection limits were 0.02, 0.027, 0.03, 0.02 and 0.04 μg/mL for standard, tablet (5 mg), tablet (1 mg), syrup and fl
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreNonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.
PubMed database was searched by the following combined formula of medical subjects headings,
This research includes theoretical and evaluation design of a polarizer filter of high transmission in the near IR region of (900-1200nm) for different incidence angles to obtain a long wave and short wave pass filter using analytical calculations. Results refer to a new configuration design in fewer layers than used in previous studies in the long wave pass at incidence angles (45o,50o,55o). Adopted Hafnium dioxide (HfO2) and Magnesium fluoride (MgF2) as coating material at design wavelength (933nm), the study also included design short wave pass polarizer by using the same coating material.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio