Backgr ound: The transfer of the tibialis posterior tendon to the anterior aspect of the ankle not only replaces the function of the paralyzed muscles, but also removes the deforming force on the medial aspect of the foot. Objecti ves: In this study, we evaluated patients who underwent tibialis posterior tendon transfer for the treatment of foot drop, and comparison through interosseous membrane route versus anterior to lower tibia route of tibialis posterior tendon transfer, with evaluation of the results according to carayon criteria Methods: Nine patients with foot drop secondary to different causes treated with tibialis posterior tendon transfer from January 2011 to January 2012 were followed up for a mean of 12 months in Al Kindy Teach
... Show MoreBac kground: The transfer of the tibialis posterior tendon to the anterior aspect
of the ankle not only replaces the function of the paralyzed muscles, but also
removes the deforming force on the medial aspect of the foot.
Objec t i ves : In this study, we evaluated patients who underwent tibialis
posterior tendon transfer for the treatment of foot drop, and comparison through
interosseous membrane route versus anterior to lower tibia route of tibialis
posterior tendon transfer, with evaluation of the results according to carayon
criteria
Methods: Nine patients with foot drop secondary to different causes treated with
tibialis posterior tendon transfer from January 2011 to January 2012 were
followed up for a
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreA new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .
The research has been talked on specific an important notions concerning with the dimensions of effectiveness of good governance and sustainable development inside all Arab states, So that the scientific article reflected the role of investments in various sections of institutional business by draw attention toward different projects about analyzing the whole political reality according to the standard indications of political and social stability on the regional level and international aspects. Therefore, the study resembled scientific contains and the dimensions of political reform and administrative overhauling within governmental system in order to achieve all raw objectives for sustainable development. All international and
... Show MoreIn this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a
... Show MoreWind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show More
