To show the impact of 790-805 nm diode laser irradiations on wound healing as a supplementary treatment in women underwent episiotomies, and to assess the laser parameters that were used .Material and methods: Eighteen female patients were included in this study; all of them underwent mediolateral episiotomy. Ten patients received laser therapy- diode laser (K Laser) (790-805) nm in CW mode of operation (and eight patients were the control group. Spot size of 8mm, time for exposure for each spot was 30 seconds. The power used was 0.6 W .The power density for each spot of treatment was 1.19 W/cm2 per session (non contact mode of application of laser therapy).The group studied received 2 sessions of laser radiation, day 4, and day 8 after labour and the women of both groups were followed on day 4,8,14 and 28 post delivery in terms of pain, tenderness, redness, oedema, and discharge. After the 1stexposurethe patients had been assessed on day 8 of delivery; and their assessment showed that pain was present in 20% of the patients, tenderness in 30%, redness and oedema in 20% and 10% with discharge; which was less than the control group that had pain in 62.5% tenderness in 50%, redness and oedema in 50%, and discharge in 25%. After the 2nd exposure (patients were assessed on day 14 post-delivery) pain, tenderness and redness present only in 10%, while in the control group: pain, tenderness, oedema and discharge in 25%, and redness in 37%. Biostimulation is a method that can be used to enhance wound healing if used with appropriate parameters. Diode laser (790-805) nm can be used for enhancing episiotomy healing as a supplementary therapy when used in the CW mode with 0.6 w power and 1.19 w/cm2 power density for 30 seconds for each spot.
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreObjective: This study goal was to screen participants from different settings in Baghdad for depression using Beck Depression Inventory (BDI) scale and identify factors influencing the levels of depression. Methods: This cross-sectional study included a convenience sample of 313 people from four settings (teaching hospital, college of medicine, college of pharmacy, and high school) in Baghdad, Iraq. The participants were screened using paper survey relying on the BDI scale during spring 2018. Using multiple linear regression analysis, we measured the association between depression scores and six participant factors. Results: The overall prevalence of depression in our sample was 57.2%. Female participants had higher BDI
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
Piled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced. The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show More