The study aimed to prepare rehabilitation exercises using some rubber ropes for people with partial rupture of the anterior cruciate ligament, to recognize their effect on the recovery of motor tides and to reduce the pain of those with partial rupture of the anterior cruciate ligament of the knee joint, and adopted the experimental method by designing the experimental and controlled groups on a sample of those with partial rupture of the anterior cruciate ligament of men (30-35) One year of those who attend the Physiotherapy Center/Rafidain University College of 12 injured were deliberately selected from their community of origin by (100%), and after determining the measuring tools and preparation of exercises applied with rubber ropes per week at a rate of (4) units per week, the total time period for the application of rehabilitation exercises with rubber ropes (12) A consecutive qualifying week, bringing the total number of sessions (48) rehabilitation units, and (4) rubber rope rehabilitation exercises were applied in one rehabilitation unit and the researchers verified the results of their study using the social statistical bag system (SPSS) to be conclusions and application The application of rehabilitation exercises using rubber ropes helps people with partial rupture of the anterior cruciate ligament of the knee joint to improve the motor range of this joint in the cases of tide and bending, and to reduce the degree of pain V.A.S)) in the cases of joint extension and bending, and outperforming their peers who received Exercises in the rehabilitation center, and the need for physiotherapy centers to focus on developing the experiences of their therapists on how to apply rehabilitation exercises using rubber ropes in light of the findings of this study, and to suit the degrees of rubber ropes to suit the level of pain in the injured when used in rehabilitation exercises.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreBackground: Acne vulgaris is one of the top three most commonly encountered dermatological problems worldwide in both primary and secondary care. Human keratinocytes express functional TLR2 heterodimers. An increased expression of TLR2 was detected in the epidermis of inflammatory acne lesions, as observed in normal skin; the expression level increased with the degree of differentiation of the keratinocytes. TLR2 expression is upregulated in inflammatory acne lesions and induced by C. acnes. The current study conducted to assess the oral isotretinion treatment effect on the acne vulgaris patients by evaluated the Toll Like Receptor 2 as a major immune system marker in Acne vulgaris immune re
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreFungi produce a series of toxic compounds on corn, especially Fumonisin B1 (FB1) toxin produced by Fusarium spp. and promoting cancer activity in humans and animals. This study aimed to the isolation and identification of fungi associated with local corn seeds and the detection for the presence of FB1 by using ELISA technique. Thirty samples of corn ears were collected from silos and markets in Baghdad city during the period from November 2018 to March 2019. The present study found that Fusarium was the dominant isolate among fungi in terms of the relative density 57.07%, followed by Aspergillus 31.17%, Rhizopus 3.36%, Alternaria 2.88%, Mucor 2.16%, Penicillium 1.92%, Trichothecium 0.96%, and Helminthosporium 0.48%. FB1 was detected in a
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreAbstract: Persian literature, after the spread of Islam in Pars, received a lot of influence from the subtle and rhetorical details of the Holy Quran. This effect is more in poetry than in prose because the weights of Persian poetry are closer to the melody of the Qur'an and its weights.The effectiveness of most of the prose works is only in the Quranic themes and words. Persian poetry that has benefited from various sciences of rhetoric, including semantics, eloquence and rhetoric. The degree and manner of influence of each of the didactic, lyrical, epic and travelogue literary types is different from the rhetorical points of the Quran. The instructions under educational literature have benefited the least from Quranic rhetoric. The max
... Show More