The purpose of this paper is to identifying some of the physical, kinetic and electrical capabilities of the working muscles of patients with simple hemiplegic cerebral palsy, preparation of special exercises (rehabilitation and water) accompanied by symmetrical electrical stimulation in the rehabilitation of working muscles for patients with simple hemiplegic cerebral palsy, and identifying the effect of exercises, especially (rehabilitation and water), accompanied by symmetrical electrical stimulation, on some physical, kinetic and electrical capabilities in rehabilitating working muscles for patients with simple hemiplegic cerebral palsy. The researcher used the experimental approach with a one-group design with two pre and post-tests due to its suitability to the research problem. The research population consisted of patients with simple hemiplegic cerebral palsy resulting from various injuries. The research sample consisted of patients with simple hemiplegic cerebral palsy and they have damage to the left part of the brain, i.e. paralysis in the right part of the body and the number of (5) injured men over the age of (35) years. They have control over their own needs (urination and excretion). One of the most important results reached by the researcher is that: The early rehabilitative approach is more useful in rehabilitating the muscles that the induction does not reach, and use of symmetrical electrical stimulation is better than the use of external stimulation whose intensity is not controlled. One of the most important recommendations recommended by the researchers is that: Need to unify the rehabilitation curricula in the Iraqi Ministry of Health and rehabilitation centers, and necessity of adhering to medical prescriptions after the injury and then moving to rehabilitation.
By optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show MoreInefficient wastewater disposal and wastewater discharge problems in water bodies have led to increasing pollution in water bodies. Pollutants in the river contribute to increasing the biological oxygen demand (BOD), total suspended solids (SS), total dissolved solids (TDS), chemical oxygen demand (COD), and toxic metals render this water unsuitable for consumption and even pose a significant risk to human health. Over the last few years, water conservation has been the subject of growing awareness and concern throughout the world, so this research focused on review studies of researches that studied the importance of water quality of wastewater treated disposal in water bodies and modern technology to management w
... Show MoreThis study is aimed to Green-synthesize and characterize Al NPs from Clove (Syzygium aromaticum
L.) buds plant extract and to investigate their effect on isolated and characterized Salmonella enterica growth.
S. aromaticum buds aqueous extract was prepared from local market clove, then mixed with Aluminum nitrate
Al(NO3)3. 9 H2O, 99.9% in ¼ ratio for green-synthesizing of Al NPs. Color change was a primary confirmation
of Al NPs biosynthesis. The biosynthesized nanoparticles were identified and characterized by AFM, SEM,
EDX and UV–Visible spectrophotometer. AFM data recorded 122nm particles size and the surface roughness
RMs) of the pure S. aromaticum buds aqueous extract recorded 17.5nm particles s
This study included the isolation and identification of Aspergillus flavus isolates associated with imported American rice grains and local corn grains which collected from local markets, using UV light with 365 nm wave length and different media (PDA, YEA, COA, and CDA ). One hundred and seven fungal isolates were identified in rice and 147 isolates in corn.4 genera and 7 species were associated with grains, the genera were Aspergillus ,Fusarium ,Neurospora ,Penicillium . Aspergillus was dominant with occurrence of 0.47% and frequency of 11.75% in rice grains whereas in corn grains the genus Neurospora was dominant with occurrence of 1.09% and frequency 27.25% ,results revealed that 20 isolates out of 50 A. flavus isolates were able
... Show MoreDam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More