In this research, a modified artificial hand with direct control has been designed using electrical artificial muscle wires that receive direct sensory impulses through human hand instead of using the mechanical action to open and close this artificial hand. Each finger is designed as a chain and its movements achieved through the conventional arrangement control of the electrical muscles wires. The results indicate that it is possible to design an artificial hand using electrical muscle wire for control it with high accuracy.
A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreThe objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitat
Two local fish Himri Carasobarbus luteus (Heckel, 1843) and Hishni Liza abu (Heckel, 1843) were stained with Alizarin Red and featured some anatomical qualities which cleared the difference of the muscular and skeletal fabric for each fish. Since clear Histologic differences appeared in these two species, it was intended from this study the possibility of adopting a diagnosis between local fish species by staining bones and tissues.
Background: Non-nutritive sucking habit (NNSH) is the main environmental causative factor that disturbs normal orofacial development. In spite of the harmful effect of pacifier as a NNSH, mothers aware from the other types of NNSH like thumb sucking far more than pacifier use. Open bite is one of the most challenging malocclusions in orthodontics due to the high prevalence of relapse after treatment, so preventing the causative factor of its occurrence is essential at early age of child life. This study aims to assess the impact of two non-nutritive patterns on the development of anterior open bite in primary dentition and to compare which of these habits mostly affect open bite development. Materials and Methods: The sample consisted of
... Show MoreThis work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respective
... Show MoreThe performance of single and two stage solar concentrator were studied ' " The ratio of the primary to the secondary mirrors diameter is taking to be 0.5, depending on the theoretical calculation for the accumulated energy by the concentrator with ratio between 0.0 to 0.9. The design of the systems were designed and examined by using a ray-tracing program. The efficiency of the single and the two stage concentrators are calculated and compared with and without cooling systems.
In this study, thermal characteristics of a two-phase closed heat pipe were investigated experimentally and theoretically. A two-phase closed heat pipe (copper container, Fluorocarbon FC-72 (C6F14) working fluid) was fabricated to examine its performance under the effect of input heat flux range of 250–1253 W/m2 , 70% fill charge ratio and various tilt angles. The temperature distribution along the heat pipe, input heat to evaporator section, and output heat from condenser were monitored. A comprehensive mathematical model was developed to investigate the steadystate heat transfer performance of a two-phase closed heat pipe. A steady state analytical model, is presented to determine important parameters on the design of two-phase close
... Show MoreAbstract his study involved evaluation of side effects of two weight reduction pills that had been widely distributed in the last period. Two weight reduction compounds are studied, Reductil (containing chemical substances) and Chinese’s weight reduction herbs (containing natural substances). Two doses for each compound are used in this research; 5mg/ml and 0.5mg/ml for Reductil, while 30mg/ml and 10mg/ml for Chinese weight reduction herbs. To evaluate the toxic effects of these compounds, the following parameters were determined which include mitotic index (cytogenetic analysis), serum FSH and LH hormones level (follicles stimulation hormone/FSH and lutenising hormone/LH) and histological examination of female mice ovaries. Control group
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.