Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm . They were ageing from 21-45
years. Results: The mean operative time was 18.9 minutes (range of 12-25) minutes. All patients
discharged after procedure to their home. No pain is presented by seven patients. Only three
patients reported a mild pain and occasional need for a pain killer. No patient complained of
incontinence anytime during postoperative period. The mean time for closure of the fistulae was
12.7 days(range of 7-18 days). Conclusions: The procedure described in this work indicate that it
may be possible to affect healing of a low anal fistula tract by mere photocoagulation of the tract
without excision or deroofing.
A prepared PMMA/Anthracene film of thickness 70μm was irradiated under reduced pressure ~10-3 to 60Coγ-ray dose of (0.1mrad-10krad) range. The optical properties of the irradiated films were evaluated spectrophotometrically. The absorption spectrum showed induced absorption changes in the 200-400nm range. At 359nm, where there is a decrease in radiation-induced absorption, the optical density as a function of absorbed dose is linear from 10mrad-10Krad.It can therefore, be used as radiation dosimeter for gamma ray in the range 10mrd-10krad
In this research we solved numerically Boltzmann transport equation in order to calculate the transport parameters, such as, drift velocity, W, D/? (ratio of diffusion coefficient to the mobility) and momentum transfer collision frequency ?m, for purpose of determination of magnetic drift velocity WM and magnetic deflection coefficient ? for low energy electrons, that moves in the electric field E, crossed with magnetic field B, i.e; E×B, in the nitrogen, Argon, Helium and it's gases mixtures as a function of: E/N (ratio of electric field strength to the number density of gas), E/P300 (ratio of electric field strength to the gas pressure) and D/? which covered a different ranges for E/P300 at temperatures 300°k (Kelvin). The results show
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
This study was conducted in the Poultry farm of the animal during the Production department, Iraqi during the (Ministry of Science and Technology) period from 3-9-2001 to 8-4-2002. The objectives of this study were to evaluate the effect of low – level chronic aflatoxicosis on performance (body weight, feed conversion efficiency and mortality), Serum biochemistry and activity of some enzymes (GOT,GPT, ALKP, LDH). A total of 300 male chicks of broiler breeder (Faw–Bro) were used. Chicks at day 1 of age were fed diets contaminated with aflatoxine at levels of 0, 0.3, 0.6, 0.9, 1.2, and 1.5 the feeding period were extended to 8 weeks. The data were subjected to analysis of variance by the completely randomized design. The results showed
... Show MoreThe deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show More