Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (FSR) and vibro-motors in which the speed of these motors is proportional to the amount of the grasp force exerted by the prosthetic hand. Investigation for optimal placement of the FSRs on a prosthetic hand to obtain convenient haptic feedback has been carried out. The results show the effect of object shape and weight on the obtained response of the FSR and how they influence the locations of the sensors.
L1 adaptive controller has proven to provide fast adaptation with guaranteed transients in a large variety of systems. It is commonly used for controlling systems with uncertain time-varying unknown parameters. The effectiveness of L1 adaptive controller for position control of single axis has been examined and compared with Model Reference Adaptive Controller (MRAC). The Linear servo motor is one of the main constituting elements of the x-y table which is mostly used in automation application. It is characterized by time-varying friction and disturbance.
The tracking and steady state performances of both controllers have been assessed fo
... Show MoreIn this paper, an adaptive integral Sliding Mode Control (SMC) is employed to control the speed of Three-Phase Induction Motor. The strategy used is the field oriented control as ac drive system. The SMC is used to estimate the frequency that required to generates three phase voltage of Space Vector Pulse Width Modulation (SVPWM) invertor . When the SMC is used with current controller, the quadratic component of stator current is estimated by the controller. Instead of using current controller, this paper proposed estimating the frequency of stator voltage since that the slip speed is function of the quadratic current . The simulation results of using the SMC showed that a good dynamic response can be obtained under load
... Show MoreThe study focused on the treatment of real oilfield produced water from the East Baghdad field affiliated to the Midland Oil Company (Iraq) using an oil skimming process followed by a coagulation/flocculation process for zero liquid discharge system applications. Belt type oil skimmer was utilized for evaluating the process efficiency with various operating conditions such as temperature (17-40 °C) and time (0.5-2.5 hr.). Polyaluminum chloride (PAC) coagulant and polyacrylamide (PAM) flocculant was used to investigate the performance of the coagulation/flocculation process with PAC dosage (5-90 ppm) and pH (5-10) as operating conditions. In the skimming process, the oil content, COD, turbidity, and TSS decreased with an increase in tempera
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThe drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the
The residual limb within the prosthesis, is often subjected to tensile or fatigue stress with varying temperatures. The fatigue stress and temperatures difference which faced by amputee during his daily activities will produces an environmental media for growth of fungi and bacteria in addition to the damage that occurs in the prosthesis which minimizingthe life of the prosthetic limb and causing disconfirm feeling for the amputee.
In this paper, a mechanical and thermal properties of composite materials prosthetic socket made of different lamination for perlon/fiber glass/perlon, are calculated by using tesile test device under varying temperatures ( from 20oC to 60oC), also in this paper a device for measuring rotational bendin
... Show MoreBackground: Acute appendicitis is the most common abdominal surgical emergency. The diagnosis of this condition is still essentially clinical and there is difficulty in the clinical diagnosis, especially among elderly, children and patients with a typical presentation, so early and accurate diagnosis of acute appendicitis is important to avoid its complications.Objectives: To evaluate the degree of accuracy of Alvarado scoring system in the diagnosis of acute appendicitis.Method: Two hundred patients were admitted to the Alkindy Teaching Hospital from January 2011 to april 2014- presented with symptoms and signs suggestive of acute appendicitis. After examination and investigations all patients were given a score according to Alvarado sc
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show More