AIM: To determine the value of the combination of thin-section 3 mm coronal and standard axial DWI and their impact in facilitating the diagnosis of acute brainstem infarction. METHODS: A cross-sectional study conducted from the 1st of April 2017 to the end of February 2018 on 100 consecutive patients (66% were male, and 34% were female) with isolated acute ischemic infarction in the brainstem. The abnormal MRI findings concerning the ischemic lesions were interpreted on standard axial 5 mm and thin-section coronal 3mm DWI. RESULTS: The mean age of the studied group was 69.2 ± 4.3 for male and 72.3 ± 2.5 years. The standard axial DWI can diagnose 20%, 6.7% and 6.7% of the infarctions in midbrain, pons and medulla oblongata respectively, while both axial and thin coronal sections together can diagnose 80% of midbrain infarctions, 93.3% of pons infarctions and 93.3% of medulla oblongata infarctions. Furthermore, the thin section coronal 3 mm section can diagnose very smaller ischemic lesion volume in comparison to the standard axial 5mm section (3.4 ± 0.45 / cm3 versus 4.6 ± 0.23 / cm3, P < 0.001) CONCLUSION: The addition of thin-section coronal DWI can facilitate the detection of brainstem ischemic lesions. We suggest its inclusion in the stroke MRI protocol.
In this work, the effects of size, and temperature on the linear and nonlinear optical properties in InGaN/GaN inverse parabolic and triangular quantum wells (IPQW and ITQW) for different concentrations at the well center were theoretically investigated. The indium concentrations at the barriers were fixed to be always xmax = 0.2. The energy levels and their associated wave functions are computed within the effective mass approximation. The expressions of optical properties are obtained analytically by using the compact density-matrix approach. The linear, nonlinear, and total absorption coefficients depending on the In concentrations at the well center are investigated as a function of the incident photon energy for different
... Show MoreEvaluating treatment effect on interferon-alpha in female patients with systemic lupus erythematosus: a case-control study
Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show More Problem solving methods and mechanisms contribute to facilitating human life by providing tools to solve simple and complex daily problems. These mechanisms have been essential tools for professional designers and design students in solving design problems.
This research dealt with one of those mechanisms, which is the (the substance-field model model), as it has been mentioning that this mechanism is characterized by the difficulty of its application, which formed the main research problem. In home gardens (the sub-problem of research), an analysis of this problem was applied and then a solution was found to address it. The researcher used the 3dsmax program to implement the proposed design.
The most important research res
Drones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference
... Show Moreيحاول البحث دراسة رواية الكاتب الاميركي جوزيف هيلر التي تحمل عنوان "كاتش 22" (1961). وفي تفحص دقيق لمحتويات الرواية نجد ان تركيزها الرئيس هو المشاعر المناهضة للروح العسكرية. ويقدم البحث شخصيات مختلفة في الرواية ويحاول ان يعكس من خلالها المشاعر المناهضة للروح العسكرية. وان البحث ناقش ايضاً تأثيرات التصرفات الخاصة والاحداث الرئيسة التي حدثت في القوة الجوية الاميركية. وتدور القصة بشكل رئيس حول بعض رجال القوة ال
... Show MoreA free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show More