This paper presents a control system to make the robotic hand mimic human hand motion in real time and offline mode. The human hand tracking system is a wearable sensing arm (potentiometers) used to determine the position in space and to sense the grasping task of human hand. The maskable sensing arm was designed with same geometrical arrangement of robotic hand that needs to be controlled. The control software of a robot was implemented using Visual Basic and supported with graphical user interface (GUI). The control algorithm depends on joint to joint mapping method to match between the motions at each joint of portable sensing arm with corresponding joint of a robot in order to make the robot mimic the motion.
Abstract Background: The emptied sheep’s ovarian follicles recently used as a container for spermatozoa during cryopreservation, it was found a proper carrier to cryopreserving spermatozoa in vapor-dependent cryopreservation. The aim of this study was to evaluate the effect of two periods of exposure to liquid nitrogen (LN2)vapor on the parameter of spermatozoa during cryopreservation in this technique. Method: The study was conducted on 30 semen samples from patients with oligozoospermia diagnosed by semen analysis according to the standard criteria of World Health Orgnization (WHO) 2010. Sheep’s ovarian follicles obtained from local slaughterhouse and prepared by slicing the ovaries and evacuating the follicular fluid and oocyt
... Show Moreيرجع تاريخ الاصلاحات الادارية إلى سبعينات القرن الماضي ،ولاسيما الندوة التي عقدت لبحث العوامل المؤثرة في انخفاض الانتاجية عام 1976، وعملية ترشيق الاجهزة الادارية للدولة عام 1987.
ان بحثنا الموسوم (نظام المعلومات المحاسبية ودوره في عملية اتخاذ القرارات) يتم عرضه في فرعين مترابطين، هما:
- المحاسبة نظام معلومات.
- الادارة صانعة للقرار.<
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Abstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreSystemic lupus erythematosus (SLE) is a chronic autoimmune disease characterized by the production of autoantibodies against nuclear antigens and a systemic inflammation that can damage a broad spectrum of organs. SLE patients suffer from a wide variety of symptoms, which can affect virtually almost any tissue. As lupus is difficult to diagnose, the worldwide prevalence of SLE can only be roughly estimated to range from 10 and 200 cases per 100,000 individuals with dramatic differences depending on gender, ethnicity, and location. Although the treatment of this disease has been significantly ameliorated by new therapies, improved conventional drug therapy options, and a trained expert eye, the underlying pathogenesis of lupus still
... Show MoreLeishmania tropica is a species of flagellate parasites that infects humans and the cause of the disease cutaneous leishmaniasis, which is the most common form of leishmaniasis. It is one of the major parasites, which have high prevalence than other parasites in Iraq. The aim was to investigate the role of HLA alleles in susceptibility to cutaneous leishmaniasis infection in Baghdad in a sample of Iraqi patients. Cross sectional study (thirty Iraqi Arab Muslims patients with Leishmania tropica infection and thirty Iraqi Arab Muslims healthy persons) were participated in this study. Patients were consulted Department of Dermatology in Medical city Teaching hospital and AL Yarmook Teaching hospital for the period between March 2014 till May 2
... Show MoreAbstract:
The aim of the research is to highlight the role of electronic human resources management practices in the sustainability of knowledge capital as one of its success factors, as well as the diagnosis and interpretation of the relationship between research variables and their dimensions. The research problem is that the University of Babil implements some electronic human resources management practices not in a complete way, The level of its application and the problems it faces, as well as the extent to which these practices reflect the knowledge capital and sustainability in the university, and highlights the importance of research as it is concerned with the electronic aspects and achieve the competitive advant
... Show MoreAbstract. Shatt Al-Arab River was the most important tide river in Iraq, it suffered from neglect and lack of maintenance in the past decades. The river embankment is constantly exposed to erosion processes due to several factors, one of the most important of these factors is the movement of water currents due to the tidal energy coming from the Arabian Gulf. In this study, one dimension unsteady-state model was implemented to study river flood capacity simulation by using HEC-RAS (5.0.7) software in Shatt Al Arab River and its tributaries. The data included flow rate, water level records were collected daily from 2018 to 2020 at different stations along the mentioned river and its feeders, additionally, the considered flood discharge data
... Show MoreThis paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show More