This paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurement data from IMUs and a goniometer were fed into the suggested Simscape model. The arm torque profiles are key to the control approach and should be traced by torques produced by the exoskeleton actuators to provide comfort and flexibility for the subjects. A DC motor was used as an actuator for the exoskeleton, and its model was used in the physical Simscape model. To reduce the error in the driving torque compared with the reference arm torque, a PID controller was implemented. The results show the potential of our methodology for tracking and controlling the actuator’s torque, in which the mean square error was reduced to less than 0.2 - a significantly low value.
This paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.
A load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh
Heat exchanger is an important device in the industry for cooling or heating process. To increase the efficiency of heat exchanger, nanofluids are used to enhance the convective heat . transfer relative to the base fluid. - Al2O3/water nanofluid is used as cold stream in the shell and double concentric tube heat exchanger counter current to the hot stream basis oil. These nanoparticles were of particle size of 40 nm and it was mixed with a base fluid (water) at volume
concentrations of 0.002% and 0.004%. The results showed that each of Nusselt number and overall heat transfer coefficient increased as nanofluid concentrations increased. The pressure drop of nanofluid increased slightly than the base fluid because
This study appears GIS techniqueand remote sensing data are matching with the field observation to identify the structural features such as fault segments in the urban area such as the Merawa and Shaqlawa Cities. The use of different types of data such as fault systems, drainage patterns (previously mapped), lineament, and lithological contacts with spatial resolution of 30m was combined through a process of integration and index overlay modeling technique for producing the susceptibility map of fault segments in the study area. GIS spatial overlay technique was used to determine the spatial relationships of all the criteria (factors) and subcriteria (classes) within layers (maps) to classify and map the potential ar
... Show MoreThe aim of this paper is to describe an epidemic model when two SI-Type of diseases are transmitted vertically as well as horizontally through one population. The population contains two subclasses: susceptible and infectious, while the infectious are divided into three subgroups: Those infected by AIDS disease, HCV disease, and by both diseases. A nonlinear mathematical model for AIDS and HCV diseases is Suggested and analyzed. Both local and global stability for each feasible equilibrium point are determined theoretically by using the stability theory of differential equations, Routh-Hurwitz and Gershgorin theorem. Moreover, the numerical simulation was carried out on the model parameters in order to determine their impact on the disease
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThe world is keeping pace with evolution in all its fields as a result of scientists' pursuit of continuous scientific and technological development. This evolution included the sports field, which had a large space in the aspect of development and for all disciplines, Therefore, it's reflected today in what we see of records and advanced achievements in sporting events and activities. The development in the field of sports was the result of scientific research (Hussein and Jawad., 2022), where the interest in the training process has become one of the most important pillars of the development of achievement (Neamah and Altay., 2020). The shooting sport has also witnessed a remarkable development due to the diversity and development of its
... Show MoreCare and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.
We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is
... Show More