This paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurement data from IMUs and a goniometer were fed into the suggested Simscape model. The arm torque profiles are key to the control approach and should be traced by torques produced by the exoskeleton actuators to provide comfort and flexibility for the subjects. A DC motor was used as an actuator for the exoskeleton, and its model was used in the physical Simscape model. To reduce the error in the driving torque compared with the reference arm torque, a PID controller was implemented. The results show the potential of our methodology for tracking and controlling the actuator’s torque, in which the mean square error was reduced to less than 0.2 - a significantly low value.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe neutrophil/ lymphocyte ratio (NLR) and platelet/lymphocyte ratio (PLR) have the potential to be inflammatory markers that reflect the activity of many inflammatory diseases. The aim of this study was to evaluate the NLR and PLR as potential markers of disease activity in patients with ankylosing spondylitis.
The study involved 132 patients with ankylosing spondylitis and 81 healthy controls matched in terms of age and gender. Their sociodemographic data, disease activity scores using the Bath Ankylosing
One of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social co
... Show MoreDirect field-orientation Control (DFOC) of induction motor drives without mechanical speed sensors at the motor shaft has the attractions of low cost and high reliability. To replace the sensor, information on the rotor speed and position are extracted from measured stator currents and from voltages at motor terminals. In this paper presents direct field-orientation control (DFOC) with two type of kalman filter (complete order and reduced order extended kalman filter) to estimate flux, speed, torque and position. Simulated results show how good performance for reduced order extended kalman filter over that of complete order extended kalman filter in tracking performance and reduced time of state estimation.
Background: The accuracy of fitness of any dental casting is imperative for the success of any prosthodontic treatment. From the time that dental casting was first introduced, efforts have been made to produce more accurate and better fitted castings with minimal marginal discrepancy. The aim of this in vitro study was to evaluate the effects of three different investing and burnout techniques on the vertical marginal discrepancies ofceramometalcopings invested with two types of phosphate- bonded investments. Materials and methods: Sixty wax patterns were fabricated on a standardized prepared brass die representing an upper central incisor by the aid of a custom-made split mold. Three different investing and burnout techniques were applied
... Show MoreDespite Iraq's possession of the energies material, human and agricultural resources and great economic but that contribution of the agricultural sector in the total gross fixed capital formation and gross domestic product in the Iraqi economy remained low and declining continuously since the nineties of the last century, as well as the inability of agricultural production to meet the country's needs of food . The food gap increased strategic food crops until it reached 1049 thousand tons in 2010. On this basis, there is a need to study and analysis the behavior of the function of gross fixed capital format
... Show More