The aims of the lecture should be clearly defmed. These will help to define the teaching methods and the structure. If, for example, the purpose of the lecture is to introduce new knowledge and concepts, then a classic lecture structure might be most appropriate. On the other hand, if the purpose is to make the students aware of different approaches to a particular clinical problem, a problem oriented design in which alternative approaches are presented and discussed might be a more appropriate fonnat.
Lectures are still a common teaching methOd in both undergraduate and postgraduak medical education. Properly done, the lectwe is a creative and personal work by the teachll:l modeled upon his intellectual scaffolding. Few other fonns of instructional method demand such a high degree of originality from tire teachers, making it both challenging adtl rewarding for them. Their continued popularity is due to the fact that they represent cr;; effective and efficient means of teaching net' concepts and knowledge.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreBackground: Although mammography is a powerful screening tool in detection of early breast cancer, it is imperfect, particularly for women with dense breast, which have a higher risk to develop cancer and decrease the sensitivity of mammogram, Automated breast ultrasound is a recently introduced ultrasonography technique, developed with the purpose to standardize breast ultrasonography and overcome some limitations of handheld ultrasound, this study aims to evaluate the diagnostic efficacy of Automated breast ultrasound and compare it with handheld ultrasound in the detection and characterization of breast lesions in women with dense breasts.
Objectives:<
... Show MoreThis paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurem
... Show MorePolish Academy of Sciences
Background: Diabetic mellitus (DM) is a collection of metabolic disorder identified by hyperglycemia. The heterogeneous etiology includes defects either in insulin secretion, or in insulin action, or the both. In addition to the distraction in carbohydrate, fat and protein metabolism. Inflammatory reaction that caused by many pro-inflammatory cytokines play a central role in the pathogenicity of T2DM, these cytokines can enhance insulin resistance which led to impaired glucose homeostasis. Subjects: The study included 75 patients (38 males and 37 females) suffering from T2DM with age mean ± SE 52.30 ± 1.60, and 70 individuals as healthy controls (35 males and 35 females) with age mean ± SE 48.88 ± 0.64. Evaluation of immunological marke
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreBanks face many of the various risks: which are of dangerous phenomena that cause the state achieved a waste of money and a threat to future development plans to be applied to reach the goals set by: prompting banks and departments to find appropriate solutions and fast: and it was within these solutions rely on Banking risk management and effective role in defining and identifying: measuring and monitoring risk and trying to control and take risks is expected to occur in order to encircle and make it in within acceptable limits: and try to avoid them in the future to reduce the losses that are likely to be exposed to the bank: and it began to emerge and dominate a lot of legislation that seeks to structure the year risk management and t
... Show More