Urinary stones are one of the most common painful disorders of the urinary system. Four new technologies have transformed the treatment of urinary stones: Electrohydraulic lithotripsy, ultrasonic lithotripsy, extracorporeal shock wave lithotripsy, and laser lithotripsy.The purpose of this study is to determine whether pulsed holmium laser energy is an effective method for fragmenting urinary tract stones in vitro, and to determine whether stone composition affects the efficacy of holmium laser lithotripsy. Human urinary stones of known composition with different sizes, shapes and colors were used for this study. The weight and the size of each stone were measured. The surgical laser system which used in our study is Ho:YAG laser(2100nm) with four adjustable parameters (Pulsed mode, Rep rate, Power, Exposure time ). After each laser irradiation, the laser parameters (different energy setting, Rep rate) and the time of each stone fragmentation were recorded and also the stones fragments were weighed and sorted using a metal ruler. All stones studied were successfully fragmented with Ho:YAG laser. Although there were differences in stone fragmentation time and ablation based on composition and sizes of the stones, in addition to factors related to laser system itself like mode of operation (single or double pulse mode) and pulse energy and pulse repetition rate and the power. The results of holmium laser lithotripsy for urinary stones have been uniformly excellent. The holmium: YAG laser has demonstrated its efficacy as a method of choice for fragmentation of urinary tract stones. Advantages include ability to fragment stones of all composition.
Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show MoreMagnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima