Background: planter fasciitis is a common condition
seen in adults and sport men, it is characterized by dull
pain in the heel, especially when getting up and
standing on the foot in the morning or after sitting for a
long time.
Recently low level laser therapy is used as a method of
treatment.
Objective: to evaluate the benefit of laser therapy in
treatment of planter fasciitis.
Methods: Out of twenty five patients with planter
fasciitis exposed to laser therapy. Laser used is (diode
type) given in two cessions per week for four weeks,
time for each cession is about (12 minutes).
Results: complete recovery seen in (32%) of patients,
moderate improvement in (16%), mild improvement in
(24%), no response in (28%), deterioration (0%).
Conclusion: laser therapy is safe for treatment of
planter fasciitis, free of side effects, very effective as
an alternative to surgery and local steroid injection,
with no deterioration in the condition during or after
laser therapy
In unpredicted industrial environment, being able to adapt quickly and effectively to the changing is key in gaining a competitive advantage in the global market. Agile manufacturing evolves new ways of running factories to react quickly and effectively to changing markets, driven by customized requirement. Agility in manufacturing can be successfully achieved via integration of information system, people, technologies, and business processes. This article presents the conceptual model of agility in three dimensions named: driving factor, enabling technologies and evaluation of agility in manufacturing system. The conceptual model was developed based on a review of the literature. Then, the paper demonstrates the agility
... Show MoreThe growth of social media is now utilized all over the world. In the past several years social media is used to communicate between person for information sharing and entertainment but now social media is also used for the hiring. This work collects data through questionnaire and online dataset on the recruitment process for three social media i.e. Facebook, Twitter, and LinkedIn. Pythagorean Fuzzy Relation (PFR) is an expansion of both Fuzzy Relationship and Fuzzy Intuitionist Relationship. The Pythagorean fuzzy set is a modern conceptual structure with greater capacity to deal with imprecision rooted in decision making. So we used this technique to identify a social media containing more number of positive respondents in recrui
... Show MoreContent-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add
... Show MoreThe Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from
... Show MoreGetting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this arti
... Show MoreSentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show MoreThe adsorption isotherms and kinetic uptakes of Carbon Dioxide (CO2) on fabricated electrospun nonwoven activated carbon nanofiber sheets were investigated at two different temperatures, 308 K and 343 K, over a pressure range of 1 to 7 bar. The activated carbon nanofiber-based on polymer (PAN) precursor was fabricated via electrospinning technique followed by thermal treatment to obtain the carboneous nanofibers. The obtained data of CO2 adsorption isotherm was fitted to various models, including Langmuir, Freundlich, and Temkin. Based on correlation coefficients, the Langmuir isotherm model presented the best fitting with CO2 adsorption isotherms’ experimental data. Raising the equ
The Normalization Difference Vegetation Index (NDVI), for many years, was widely used in remote sensing for the detection of vegetation land cover. This index uses red channel radiances (i.e., 0.66 μm reflectance) and near-IR channel (i.e., 0.86 μm reflectance). In the heavy chlorophyll absorption area, the red channel is located, while in the high reflectance plateau of vegetation canopies, the Near-IR channel is situated. Senses of channels (Red & Near- IR) read variance depths over vegetation canopies. In the present study, a further index for vegetation identification is proposed. The normalized difference vegetation shortwave index (NDVSI) is defined as the difference between the cubic bands of Near- IR and Shortwave infrared
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show More