Preferred Language
Articles
/
alkej-617
Design and Analysis of New Prosthetic Foot.
...Show More Authors

There is a variety of artificial foot designs variable for use with prosthetic legs . Most of the design can be divided into two classes, articulated and non-articulated feet. one common non-articulated foot is the SACH . The solid ankle cushion heel foot referred to as the SACH foot has a rigid keel .

One key or the key factor in designing a new prosthesis is in the analysis of a patients response .

 This view is the most important because if the foot does not provide functional , practical or cosmetically acceptable characteristics the patient will not feel comfortable with the prosthesis , therefore design and manufacturing a new foot is essential, this foot made from polyethylene, its different shape and characteristics

The characteristics deemed important by patients in achieving natural gait motion include:

Dorsiflexion

Energy return

Fatigue test

  In this study, including all these characteristics test, design fatigue foot tester according to ISO 10328 and design new foot .Also, the testometric crosshead was modified to find dorsiflexion angle and energy return .The fatigue criteria for polymer was proposed, in mathematical solution.

 Finally , the characteristics of SACH foot was compared  with  new foot by mathematical solution and used visual basic program and experimental method by different tests. From these test that the new foot is better than SACH foot for all test .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 21 2023
Journal Name
International Journal Of Professional Business Review
Analysis of the Impact of Six Sigma and Risk Management on Iraq's Energy Sector Metrology
...Show More Authors

Purpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance.   Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis.   Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and t

... Show More
View Publication
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Split and Merge Regions of Satellite Images using the Non-Hierarchical Algorithm of Cluster Analysis
...Show More Authors

يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Hydraulic Analysis and Performance Evaluation of Combined Trunk Sewers: a Case Study of Baghdad City.
...Show More Authors

Sewer system plays an essential task in urban cities by protecting public health and the environment. The operation, maintenance, and rehabilitation of this network have to be sustainable and scientifically. For this purpose, it is crucial to support operators, decision makers and municipalities with performance evaluation procedure that is based on operational factors. In this paper, serviceability and performance indicator (PI) principles are employed to propose methodology comprising two enhanced PI curves that can be used to evaluate the individual sewers depending on operational factors such as flowing velocity and wastewater level in the sewers. To test this methodology; a case study of al-Rusafa in Baghdad city is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Current Research In Microbiology And Biotechnology
Cytogenetic Analysis for the Effect of Alcoholic and Water Extracts of Iraqi Propolis in Mice
...Show More Authors

This study was conducted to study the cytogenetic effect of both alcoholic and water extracts of propolis on mice. Three different samples of propolis were collected from three different regions of Iraq (Najaf, Arbil and Baghdad) to be used in this study. The cytotoxic effect of two different doses of each extracted sample was measured by employing cytogenetic analysis which included (mitotic index (MI), chromosomal aberrations (CAs), micronucleus index (MN) and sperm abnormalities). Results showed that significant increase in MI and significant reduction in MN, CAs and sperm abnormalities percentage were seen after treatment with both alcoholic and water extract of the three samples when compared with negative control, and alcoholic extrac

... Show More
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
المشروعـــــــــــــــــــــــــــــــات الزراعيــــــــــــــــــــــــــة ... الإعـــــــــــــــداد و التنفيـــــــــــذ
...Show More Authors

This research aimed at focusing on the importance of the preparation and execution of agricultural projects in Iraq. This research also focusing on the requirement for investment in various and integrated agricultural projects based on appropriate technical and economical basis.

                The research demonstrated the following: specifying and preparation of the project, determining feasibility and principles, aspect outlines economical analysis, implementation stages and economical rate of return.

            The research arrived at conclusions that the project ideas are determined by de

... Show More
View Publication
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
تركیا و مشروع الشرق الأوسطي
...Show More Authors

Turkey came back to the Middle East hardly after long disappearance
throughout its moderate regional policy, which put its in the middle of the
events it reverse its place throughout the regional references in the region,
the way of coming back was too difficult and hard, the internal Turkish
troubles and inhibitors coming together with the maintenance bonds that
forms great complex barrier.
But the great Turkish foreign policy represented by the foreign minister
Ahmed David Oghlu, can successfully pass these problems and as a result it
withdraw turkey both geographical and political to its neighbor after long
period of disappear, it new regional policies cancel the old impressions that
was still in the mind

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The new aesthetic in contemporary world painting
...Show More Authors

The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More