Background: Ultrasonography has been used to examine the thickness of the lower uterine segment in women with previous cesarean sections in an attempt to predict the risk of scar dehiscence during subsequent pregnancy. The predictive value of such measurement has not been adequately assessed. Objectives: To correlate lower uterine segment thickness measured by trans abdominal ultrasound in pregnant women with previous cesarean section with that measured during cesarean section by caliper and to find out minimum lower uterine segment thickness indicative of integrity of the scar.Methods: A prospective observational study at Elwyia Maternity Teaching Hospital, from January 2011 to January 2012. A total of 143 women were enrolled in the study. Those women who were included were pregnant with gestational age (36-40) weeks, all had history of previous one or more cesarean section. Transabdominal ultrasound measurement of thickness uterine segment thickness done with moderately full bladder before delivery and correlated with these measured directly during operation using a caliper. The sensitivity and specificity of ultrasound calculated with positive and negative predictive value. Results: The sensitivity and specificity of trans abdominal ultrasound in detecting patient at risk of scar dehiscence in patient with previous and cesarean section not starting uterine contractions were very high 90%and 92% respectively with positive and negative predictive value of 90% and 92% respectively with a cut off value of uterine segment thickness of 4.5 mm. It was also has high sensitivity and positive predictive value of 93.4% and 93% respectively with patients that started labor but with low specificity and negative predictive value of 50% and 38% respectively with the same cut off value.Conclusions: Sonographic lower uterine segment thickness is a strong predictor for uterine scar defect in women with prior Caesarean section. However, no ideal cut-off value can yet be recommended, whenever uterine contractions started. But this method carries a high sensitivity and specificity in patients who did not start uterine contractions with a cut-off value of 4.5 mm.
This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
Abstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show MoreSentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreIn this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model during di
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More