An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological
... Show MoreLow oil extraction and early high water production are caused in part by reservoir heterogeneity. Huge quantities of water production are prevalent issues that happen in older reservoirs. Polyacrylamide polymer gel systems have been frequently employed as plugging agents in heterogeneous reservoirs to regulate water output and increase sweep efficiency. Polyacrylamide polymer gel systems are classified into three classes depending on their composition and application conditions, which are in-situ monomer gel, in-situ polymer gel, and preformed particle gel (PPG).
This paper gives a comprehensive review of PPG’s status, preparation, and mechanisms. Many sorts of PPGs are categorized, for example, millimeter-sized preformed p
... Show MoreA simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the
... Show MoreThis paper aims at exploring the impact of the Iraq-Iran war in the poetry of Adnan Al-Sayegh. Al-Sayegh participation in this war makes him a first hand witness to the atrocities of the trenches and fight in the first lines. This war did not only change his life and world view for good, it changes the nature of his poetry as well. As aresult, war becomes a central issue not only in the poetry Al-Sayegh wrote in the 1980s and 1990s Iraq, but also in the exile.
Key Words: War, Al-Sayegh, Poetry.
As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreThis paper is Interested with studying the performance of statistic test the hypothesis of independence of the two variables (the hypothesis that there is no correlation between the variables under study) in the case of data to meet the requirement of normal distribution in the case away from the distribution due to the presence of outliers (contaminated values) and compared with the performance of some of the other methods proposed and modified
Nanocrystalline ZnO/Zeolite type A composite was prepared by simple method of operation by . the precipitation of zinc oxide and loading on zeolite 5A in one step. Characterization was made by X-ray diffraction (XRD), X-ray fluorescence(XRF), N2 adsorption- desorption for BET surface area, and Atomic force microscopy (AFM). Results showed that zinc oxide was loaded on zeolite as noticed by the characteristic peaks and was of nano scale having an average diameter of 88.57nm. The percentage loading of ZnO on zeolite A was 28.37% and the surface area was 222m2/g. The activity of the prepared catalyst was examined in the desulfurization of double hydrogenated diesel fuel. The process was investigated in a
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More