To show the impact of 790-805 nm diode laser irradiations on wound healing as a supplementary treatment in women underwent episiotomies, and to assess the laser parameters that were used .Material and methods: Eighteen female patients were included in this study; all of them underwent mediolateral episiotomy. Ten patients received laser therapy- diode laser (K Laser) (790-805) nm in CW mode of operation (and eight patients were the control group. Spot size of 8mm, time for exposure for each spot was 30 seconds. The power used was 0.6 W .The power density for each spot of treatment was 1.19 W/cm2 per session (non contact mode of application of laser therapy).The group studied received 2 sessions of laser radiation, day 4, and day 8 after labour and the women of both groups were followed on day 4,8,14 and 28 post delivery in terms of pain, tenderness, redness, oedema, and discharge. After the 1stexposurethe patients had been assessed on day 8 of delivery; and their assessment showed that pain was present in 20% of the patients, tenderness in 30%, redness and oedema in 20% and 10% with discharge; which was less than the control group that had pain in 62.5% tenderness in 50%, redness and oedema in 50%, and discharge in 25%. After the 2nd exposure (patients were assessed on day 14 post-delivery) pain, tenderness and redness present only in 10%, while in the control group: pain, tenderness, oedema and discharge in 25%, and redness in 37%. Biostimulation is a method that can be used to enhance wound healing if used with appropriate parameters. Diode laser (790-805) nm can be used for enhancing episiotomy healing as a supplementary therapy when used in the CW mode with 0.6 w power and 1.19 w/cm2 power density for 30 seconds for each spot.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion