Biped robots have gained much attention for decades. A variety of researches have been conducted to make them able to assist or even substitute for humans in performing special tasks. In addition, studying biped robots is important in order to understand human locomotion and to develop and improve control strategies for prosthetic and orthotic limbs. This paper discusses the main challenges encountered in the design of biped robots, such as modeling, stability and their walking patterns. The subject is difficult to deal with because the biped mechanism intervenes with mechanics, control, electronics and artificial intelligence. In this paper, we collect and introduce a systematic discussion of modeling, walking pattern generators and stability for a biped robot.
Background: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreAllah legislated marriage and made it dwelling, fellowship and mercy between
the two couples, Prophet Moh'd (peace of Allah and blessing be upon him) ordered a
husband to look after his wife, treat her with full charity and make love with here
every kindly. On the other hand, he ordered a wife to obey her husband and respect
him deeply, nevertheless, some obstacles may sometimes be appeared within the life
of their marriage, this may be caused by either a husband or a wife. This problem is
called lifely disobedience (AL-Noshooz).
In the other words, this means that a wife begins to hate her husband, refuse his orders
and not obey him.
In brief, they hate each other which leads to some marks appear in their
m
Obesity is an escalating health problem in developing countries. One to ten children worldwide are overweight in a report showed by the International Obesity Task Force. Ghrelin, orexigenic peptide, has 28 amino acids, it is considered the greatest remarkable promotion in the last two decades for understanding the physiological changes of action regulating food intake and hunger. Obestatin is a 23-amino acid peptide nearly connected to ghrelin that secures from substitutio
... Show MoreOxidative stress plays a crucial role in the pathogenesis of peripheral artery disease (PAD). This study aimed to investigate the effect of clopidogrel on oxidative stress in PAD patients. Seventy subjects were divided into three groups: PAD patients before treatment (B-PAD), PAD patients after treatment with clopidogrel (A-PAD), and healthy controls. Serum levels of superoxide dismutase (SOD), copper (Cu), zinc (Zn), manganese (Mn), and oxidized protein were measured. SOD activities were also determined. The results showed that SOD activities, and SOD specific activities were significantly decreased in PAD patients compared to healthy individuals. After treatment with clopidogrel, SOD activities, and SOD specific activities were continuous
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreAverage interstellar extinction curves for Galaxy and Large Magellanic Cloud (LMC) over the range of wavelengths (1100 A0 – 3200 A0) were obtained from observations via IUE satellite. The two extinctions of our galaxy and LMC are normalized to Av=0 and E (B-V)=1, to meat standard criteria. It is found that the differences between the two extinction curves appeared obviously at the middle and far ultraviolet regions due to the presence of different populations of small grains, which have very little contribution at longer wavelengths. Using new IUE-Reduction techniques lead to more accurate result.
Background: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis
... Show MoreDBN Rashid, Al- Utroha Journal, 2018
The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More