Biped robots have gained much attention for decades. A variety of researches have been conducted to make them able to assist or even substitute for humans in performing special tasks. In addition, studying biped robots is important in order to understand human locomotion and to develop and improve control strategies for prosthetic and orthotic limbs. This paper discusses the main challenges encountered in the design of biped robots, such as modeling, stability and their walking patterns. The subject is difficult to deal with because the biped mechanism intervenes with mechanics, control, electronics and artificial intelligence. In this paper, we collect and introduce a systematic discussion of modelin
Background: Type 2 diabetes mellitus (T2DM) characterized by insulin resistance (IR) and progressive decline in functional beta (β) cell mass partially due to increased β cell apoptosis rate. Pancreatic stone protein /regenerating protein (PSP/reg) is produced mainly by the pancreas and elevated drastically during pancreatic disorder. Beta cells are experiencing apoptosis that stimulate the expression of PSP/reg gene in surviving neighboring cells, and that PSP/reg protein is subsequently secreted from these cells which could play a role in their regeneration.
Objectives: To analyze serum levels of PSP/reg protein in T2DM patients and evaluate its correlation with the microvasc
... Show MoreThis paper presents designing an adaptive state feedback controller (ASFC) for a magnetic levitation system (MLS), which is an unstable system and has high nonlinearity and represents a challenging control problem. First, a nonadaptive state feedback controller (SFC) is designed by linearization about a selected equilibrium point and designing a SFC by pole-placement method to achieve maximum overshoot of 1.5% and settling time of 1s (5% criterion). When the operating point changes, the designed controller can no longer achieve the design specifications, since it is designed based on a linearization about a different operating point. This gives rise to utilizing the adaptive control scheme to parameterize the state feedback controll
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreBoth type 1 diabetes and type 2 diabetes have a genetic component, with over 60 chromosomal regions related to type 1 diabetes and over 200 connected with type 2 diabetes at significant genome-wide levels. Numerous single nucleotide polymorphisms in the RETN gene and genetic variables can account for up to 70% of the variations in circulating resistin levels. The RETN polymorphism has been linked in numerous studies to obesity, insulin sensitivity, type 2 diabetes, and cerebrovascular illness. Our objective is to compare this RETN gene 3ʹ-untranslated region polymorphism in type 1 diabetes and type 2 diabetes Iraqi patients. We choose 51 type 1 diabetes and 52 type 2 diabetes patients against 50 healthy subjects (control group) to investig
... Show MoreAbstractBackground:Psoriasis is an inflammatorydiseasewhichcan be associated with otherdiseases, which may have amajor impact onpatientslife. Psoriasis has also been reported tobe associated with metabolic disorders.Metabolic syndrome(MS)isa combination ofmedicaldisorders that, when occurring together,increasesthe risk of development ofcardiovasculardiseasesanddiabetes.It affectsone in five people in the United States andtheprevalence increases with age. Some studieshave showntheprevalencein the USA to be anestimated 25% of the population.Objective:To investigate the prevalence ofmetabolic syndrome in patients with psoriasis.Methods: We performed a hospital-based case-
Multiple sclerosis (MS) is a chronic, inflammatory demyelinating disease of central nervous system with complex etiopathogenesis that impacts young adults (Lee et al., 2015), and MS impacts younger and middle aged character and leads to a range of disabilities that can alter their daily routines (Yara et al, 2010). Although, the exact cause of MS is still undetermined, the disease is mediated by adaptive immunity through the infiltration of T cells into the central nervous system (Bjelobaba et al, 2017). MS causes the Focal neurological symptomsand biochemical changes in the molecular level and the variation of neural cells such as loss or alteration of sensation, motor function, visible signs such as blurred vision or transient blindness,
... Show MoreThe convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More