Bionic Arm
Journal Title: International Journal of Engineering and Science Invention - Year 2017, Vol 6, Issue 9
Abstract
Around 1 million people were injure during the Iraq war, most of them amputed. Also around 3 million people lose their limbs due to accident and some by birth. Many amputees in the world lose hope in life after losing the arm so in this report we have described as to how to build a Bionic Arm. Also, we have designed a prototype of Bionic Arm with 4 Degrees of Freedom capable of mimicking a normal arm. With our project we are aiming to provide a low cost solution to the amputees so that they can lead a normal life like others. Our project provides a remotely controlled substitute for the arm. It can also be used for industrial applications.
Authors and Affiliations
Nayim Ali Khan, Nagesh K, Rahul R
Restoration of Minor Irrigation Tank Using Geophysical Methods in Deccan Traps – A Case Study in Sawangi, Amravati District, Maharashtra
In watershed areas the groundwater management can be solved by building irrigation tanks to sustain from drought and improve crop yield. The minor irrigation tanks can also supply water for drinking purpose. When the tan...
Fuzzy Rough Set Based Network Intrusion Detection with Wrapper Subset Evaluator
With the growing penetration of Internet, concerns of cyber security is looming high world-wide. In one hand there is enthusiasm to develop internet based applications for wider access, on the other hand seriousefforts a...
An Efficient and Enhanced Photo catalytic Activity of Zno Nano particles on Mineralization of Congo red Dye in Aqueous Medium
ZnO microspheres were successfully synthesized by a wet chemical method. The structure and morphology of the samples were investigated by X-ray diffraction and Scanning electron microscopy. X-ray diffraction revealed the...
About utilizing the concept of the Engineering of Needs (EoN) in the Technology Assessment(TA) approach
.
Remote User Authentication Schemes: A Review
To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks. In last decade authen...