Background: Congenital club foot is a complex deformity of foot .It is a collection of different abnormalities, with different etiologies. Consequently, Severity varies with difficulties in evaluating treatment strategies with outcome results. The treatment of congenital club foot remains controversial. Usually, the orthopedist's goal is to obtain anatomically and functionally normal feet in all patients. Objective: To asses short term follow up result of conservatively treated club feet in relation to the age of initial casting by Ponseti technique. Methods :A cross sectional observational study with some comparative content done in Al-kindy teaching hospital .A total of 36 patients (44 clubfeet) were treated by Ponseti method during the period of October 2014 to April 2017and were studied prospectively (mean follow up period 6 months, minimum follow-up period of 3 months) . Twenty six patients were male, thus male to female ratio is 2.6 : 1. It involved only patients less than two months. The patients were divided in to two groups: Group (A) included patients less than 4 weeks, while Group (B) between 4-8 weeks of age at the initiation of the treatment. gender, bilateralism, severity of the initial clubfoot deformity measured by Pirani Severity Score System, total numbers of Ponseti casts before the tenotomy, details of tenotomy, compliance with brace were examined. Passive range of movements and look of club foot are evaluated with mean six months follow-up. Results: We followed the functional Pirani Severity Scoring System and got good to excellent results in 32 patients 88.9 % (37 clubfeet – 84.1%) at mean 6 months of follow up. Ten patients 27.8 % (12 clubfeet – 27.3%) had relapse at varying age; out of which 6 patients 60% (8clubfeet 66.7%) were corrected by Ponseti casting method, while 4 patients 40% (4 clubfeet 33.3%) were resistant to Ponseti method. Poor compliance with the Denis Browne splint and poor cast technique was thought to be the main cause of failure in these patients. Conclusion: Good understanding the main pathology of club foot, and the ideal method of conservative treatment for correction of the deformities systematically before starting the treatment. In all types of club foot, we start conservative treatment, either as a definite treatment or to make surgical treatment easier for the surgeon and the patient. So Starting the treatment from the first day of life give excellent results and it will be decreased with delay.
In this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.
In this paper, a differential operator is used to generate a subclass of analytic and univalent functions with positive coefficients. The studied class of the functions includes:
which is defined in the open unit disk satisfying the following condition
This leads to the study of properties such as coefficient bounds, Hadamard product, radius of close –to- convexity, inclusive properties, and (n, τ) –neighborhoods for functions belonging to our class.
thin films of se:2.5% as were deposited on a glass substates by thermal coevaporation techniqi=ue under high vacuum at different thikness
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe aim of this study is to determine the effect of cold plasma on nails pH, creatine levels and the accumulative of some trace elements in humans nails. Creatine levels in the blood, as well as pH and trace elements, were measured before and after (1, 2) months of plasma exposure in both gender (men and women) between the ages of 22 and 25 years. Nails are exposed to cold plasma with a voltage of (175 volts) and (2 gas flow). After one month of exposure, there was no significant change in the levels of all parameters, but after 2 months, the concentration of creatine and pH had reached a near- neutral value. In both men and women, calcium concentration increased and showed a positive response to cold plasma, while the v
... Show More In this paper,we construct complete (kn,n)-arcs in the projective plane PG(2,11), n = 2,3,…,10,11 by geometric method, with the related blocking sets and projective codes.
A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More