This paper proposes a new approach to model and analyze erect posture, based on a spherical inverted pendulum which is used to mimic the body posture. The pendulum oscillates in two directions, [Formula: see text] and [Formula: see text], from which the mathematical model was derived and two torque components in oscillation directions were introduced. They are estimated using stabilometric data acquired by a foot pressure mapping system. The model was quantitatively investigated using data from 19 participants, who were first were classified into three groups, according to the foot arch-index. Stabilometric data were then collected and fed into the model to estimate the torque’s components. The components were statistically processed, and the results revealed that the components in direction [Formula: see text] are able to reject intrinsic perturbation. The frequency spectrum of the components in direction [Formula: see text] was processed using fast Fourier transform, and the results showed the feasibility of the component in segregating foot deformities. In addition, high-arched foot cases tended to be more stable than other cases because the exerted torque is less. The torque profiles estimated by our model were compared with the profiles derived from a classical inverted pendulum. In most cases, our results showed a significant change ( t-test p < 0.05).
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreTo maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show MoreThis research aimed to evaluate the level of readiness to teach science in the light of the information, media, and technology skills among undergraduate students at the Faculty of Edu-cation, King Khalid University. To achieve this goal, a descriptive and analytical approach was used. A list of readiness to teach science was prepared in the light of Information, media, and technology skills, and in the light of this list, a cognitive test, observation sheet, and attitude scale were prepared to assess readiness to teach science in its three aspects, cognitive, behavioral, and emotional. The sample of the research consisted of (42) students enrolled in field training courses at the sixth, seventh and eighth levels. Research tools were app
... Show MoreDensity Functional Theory (DFT) method of the type (B3LYP) and a Gaussian basis set (6-311G) were applied for calculating the vibration frequencies and absorption intensities for normal coordinates (3N-6) at the equilibrium geometry of the Di and Tetra-rings layer (6, 0) zigzag single wall carbon nanotubes (SWCNTs) by using Gaussian-09 program. Both were found to have the same symmetry of D6d point group with C--C bond alternation in all tube rings (for axial bonds, which are the vertical C--Ca bonds in rings layer and for circumferential bonds C—Cc in the outer and mid rings bonds). Assignments of the modes of vibration IR active and inactive vibration frequ
... Show MoreBackground: Toxoplasmosis is a very common infection caused by the obligate intracellular protozoan parasite. This parasite is called Toxoplasma gondii widely distributed around the world . Toxoplasma gondii can be vertically transmitted to the fetus during pregnancy and may cause wide range of clinical manifestations in the offspring.
Objective: To determine seroprevalence Immunoglobulin G (IgG) and Immunoglobulin M (IgM ) to toxoplasma gondii among pregnant women and to identify the risk factors.
Type of the study: A cross-sectional study.
Methods: A total of 110 blood samples of pregnant women were collected from
... Show MorePesticides serve a crucial function in contemporary farming practices, safeguarding agricultural crops against pest infestations and boosting production outputs. However, indiscriminate use has caused environmental and human health damage. This study aimed to develop and validate a gas chromatography-flame ionization detection (GC-FID) methodology for the direct and routine analysis of spiromesifen residues in soil, leaves, and tomato fruits. The proposed method prioritizes simplicity by avoiding derivatization steps, offering advantages over existing approaches that utilize lengthy multi-step extraction or derivatization prior to GC analysis. A key novelty of this work is the development of a QuEChERS extraction coupled directly to GC-FID
... Show MoreThis study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch
... Show More