An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological sphincterotomy using Glyceryl trinitrate , Isosorbide dinitrate or calcium channel blockers are exciting alternative treatment , that relaxes the anal sphincter and, therefore, promote healing, the drawback of such medications are headache and poor compliance. With the introduction of Botulinum toxin as mean of chemical sphincterotom, topical injection of Botulinum toxin reduces the anal hypertonia which lasts for few months, allows the fissure to heal, thus eliminating the need for surgery without incidence of incontinence. Cure rates are over 60%, and the procedure can be repeated safely. Therefore, Botulinum toxin is a reasonable first-line management of chronic anal fissure and the relapses can be managed by surgery Keywords: Non-surgical treatment of anal fissure, fissure in ano, sphicterotomy,botulinum toxin in anal fissures, glyceryl trinitrate. Chemical sphincteratomy, pharmacological sphincteratomy.
In this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases;
... Show MoreThe researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.
The formula is effective in Surat Nisa
(A study of gramophone)
in the name of o Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa
المستخلص [English] Peace-building is a science that has its foundations and needs mechanisms, components, studies and plans based on the needs of the parties responsible for achieving peace and meeting the necessary needs of conflict societies, as it has become a goal sought by many local and regional actors and parties. The State of South Africa has realized this fact and has devoted space in its conception and planning to addressing the issues of conflict and war within the framework of its unitary work.Since security and stability in general seek to create peaceful and legal means through which existing problems can be expressed and addressed. The differences have varied to build peace and create cooperation between groups and th
... Show MoreIntroduction to Medical Physics for Pharmacy Students and Medical Groups - ISBNiraq.org
Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreLarge amounts of plasma, the universe’s fourth most common kind of stuff, may be found across our galaxy and other galaxies. There are four types of matter in the cosmos, and plasma is the most common. By heating the compressed air or inert gases to create negatively and positively charged particles known as ions, electrically neutral particles in their natural state are formed. Many scientists are currently focusing their efforts on the development of artificial plasma and the possible advantages it may have for humankind in the near future. In the literature, there is a scarcity of information regarding plasma applications. It’s the goal of this page to describe particular methods for creating and using plasma, which may be us
... Show More