Low-intensity laser irradiation has been explored as an alternative, non-invasive method to encourage chronic wounds to heal. This study aimed to evaluate the effects of low level laser therapy (biostimulation) using semiconductor diode laser with wavelength (785 nm) on the enhancement of chronic wound healing. Fifty patients with chronic wounds were selected to be treated with Low Level Laser Therapy. Their ages ranged between 1 to 76 years. The wound sites were distributed in the lower limb, upper limb, trunk , perineum and head (70%,14%,12%,2%,2%, respectively). Application of laser therapy by noncontact method few millimeters from the skin for 15 minutes per one session twice weekly for two months ; ie,16 sessions for each patient. Results: The responses of wounds (56%), 12 patients with more than toward Low Level Laser Therapy LLLT were different as fallow; 28 patients had complete healing 50% healing (24%),8 patients with less than 50% healing (16%) and 2 of patients did not heal (4%).Conclusions: LLLT is an effective modality for treating chronic wounds. LLLT is an effective method in treating chronic wounds in patients with comorbidity and contraindications or precautions for surgery like epilepsy and chronic hepatitis carrier.
لا شك أن الموسيقى هي أقدر الفنون على خدمة الإنسان، وهي أرقى أنواع منشطات الحياة والصحة النفسية والعضوية، فالصحة النفسية والعضوية هي تناسق الشيء مع كل شيء الخلية مع الخلايا، والروح مع الأرواح، والإنسان مع الكون، كما تتناسق النغمة مع النغمات، والآلة مع الآلات .
يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The alfalfa plant, after harvesting, was washed, dried, and grinded to get fine powder used in water treatment. We used the alfalfa plant with ethanol to make the alcoholic extract characterized by using (GC-Mass, FTIR, and UV) spectroscopy to determine active compounds. Alcoholic extract was used to prepare zinc nanoparticles. We characterized Zinc nanoparticles using (FTIR, UV, SEM, EDX Zeta potential, XRD, AFM). Zinc nanoparticle with Alfalfa extract and alfalfa powder were used in the treatment of water polluted with inorganic elements such as Cr, Mn, Fe, Cu, Cd, Ag by (Batch processing). The batch process with using alfalfa powder gets treated with Pb (51.45%), which is the highest percentage of treatment. Mn (13.18%), which is the
... Show MoreThe daily practices of humans produce various types of waste, which are a threat to the health and environment surrounding it, especially after the increase in quantities as a result of population growth and technological development, and here came the need for recycling solid waste as one of the modern concepts that achieve environmental benefits, The aim of the research is to evaluate the project of sorting and recycling of solid waste in the district of Mahmoudiya and whether its work is sustainable ,Conforming to modern standards, using standard checklists to determine the gap between the current laboratory reality and the requirements of those standards , Using the case study methodology as the most appropriate approach
... Show MoreThis study was conducted to evaluate the bottled water quality for the six-producing companies in Baghdad city, where selected six brands which are the most marketed in the Iraqi market, especially in Baghdad, where taking the proper amount of bottled water in September 2015 and included the studied characteristics (EC , pH ,TDS, Turbidity, Ca+2, Mg+2, Cl-, No3-, So4-2, HCO3-, Na+ and K+) in addition to the total population of bacteria aerobic and coliform, and compare the results with the standard specifications of the Iraqi and the World Health Organization (WHO), as well as to compare the results of sampling specifications mentioned on the packaging by the producing companies. The results showed the presence of high significant differ
... Show MoreEconomic performance is one of the most important indicators of economic activity and with the performance of the economy progress varied sources of output and increase economic growth rates and per capita national income, and to recover the business environment and increase investment rates and rising effectiveness of the financial and monetary institutions and credit market. Which leads to increased employment rates and reducing unemployment rates and the elimination of many of the social problems and improve the average per capita income as well as improve the level of national income.
The input / output tables is a technique mathematical indicates economic performance
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.