Preferred Language
Articles
/
rRbfGIoBVTCNdQwCg5De
Quantitative analysis and control of the torque profile of the upper limb using a kinetic model and motion measurements
...Show More Authors

This paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurement data from IMUs and a goniometer were fed into the suggested Simscape model. The arm torque profiles are key to the control approach and should be traced by torques produced by the exoskeleton actuators to provide comfort and flexibility for the subjects. A DC motor was used as an actuator for the exoskeleton, and its model was used in the physical Simscape model. To reduce the error in the driving torque compared with the reference arm torque, a PID controller was implemented. The results show the potential of our methodology for tracking and controlling the actuator’s torque, in which the mean square error was reduced to less than 0.2 - a significantly low value.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Bayesian Computational Methods of the Logistic Regression Model
...Show More Authors
Abstract<p>In this paper, we will discuss the performance of Bayesian computational approaches for estimating the parameters of a Logistic Regression model. Markov Chain Monte Carlo (MCMC) algorithms was the base estimation procedure. We present two algorithms: Random Walk Metropolis (RWM) and Hamiltonian Monte Carlo (HMC). We also applied these approaches to a real data set.</p>
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Flow injection analysis for the photometric determination of promethazine-HCl in pure and pharmaceutical preparation via oxidation by persulphate using Ayah 3SX3-3D solar micro photometer
...Show More Authors

The first flow injection spectrophotometric method is characterized by its speed and sensitivity which have been developed for the determination of promethazine-HCl in pure and pharmaceutical preparation. It is based on the in situ detection of colored cationic radicals formed via oxidation of the drug with sodium persulphate to pinkish-red species and the same species was determined by using homemade Ayah 3SX3-3D solar flow injection photometer. Optimum conditions were obtained by using the high intensive green light emitted diode as a source. Linear dynamic range for the absorbance versus promethazine-HCl concentration was 0-7 mmol.L-1, with the correlation coefficient (r) was 0.9904 while the percentage linearity (r2%) was 98.09%. the L.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the speed of response of the exported quantity of crude oil to the increase in its prices using the model Impulse Response Functions (IRF) (Iraq case study) for the period (1978-2017)
...Show More Authors

Abstract

     Oil is considered a commodity and is still an important and prominent role in drawing and shaping the Iraqi economic scene. The revenues generated from the export of oil are considered the main source of the general budget in cash flows.  

     Since the revenues consist of quantity and price and the latter is an external factor which is difficult to predict, The effect of any commodity on its price, which is proven in the theory of micro-economic, but it is observed through the research that the response is slow, which means not to take advantage of the rise in prices, by increasing the quantity exported, the result of several facto

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
A Mathematical Model for Iraqi Airways Company about Evaluating Its Objectives and Strategies
...Show More Authors

In this paper, we introduced a mathematical model for Iraqi Airways Company about evaluating its objectives and strategies. First, we studied Iraqi Airways schedules with different departure cities for each airline path. Then, we applied some fuzzy integrals for determining the best airline path.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
A New Regimen in the Treatment of Psoriasis Using Oral Methotrexate
...Show More Authors

View Publication
Crossref