Preferred Language
Articles
/
jkmc-746
Using of Laser Therapy in the Treatment of Patients With Plantar Fasciitis
...Show More Authors

Background: planter fasciitis is a common condition
seen in adults and sport men, it is characterized by dull
pain in the heel, especially when getting up and
standing on the foot in the morning or after sitting for a
long time.
Recently low level laser therapy is used as a method of
treatment.
Objective: to evaluate the benefit of laser therapy in
treatment of planter fasciitis.
Methods: Out of twenty five patients with planter
fasciitis exposed to laser therapy. Laser used is (diode
type) given in two cessions per week for four weeks,
time for each cession is about (12 minutes).
Results: complete recovery seen in (32%) of patients,
moderate improvement in (16%), mild improvement in
(24%), no response in (28%), deterioration (0%).
Conclusion: laser therapy is safe for treatment of
planter fasciitis, free of side effects, very effective as
an alternative to surgery and local steroid injection,
with no deterioration in the condition during or after
laser therapy

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Indian Journal Of Forensic And Toxicology
Antifungal activity of silver nanoparticles using penicillium chrysogenum extract against the formation of biofilm for candida glabrata
...Show More Authors

Scopus (5)
Scopus
Publication Date
Fri Apr 21 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Study of the x-ray diffraction lines of calcium titanate nanoparticle using SSP method and Scherrer method
...Show More Authors

In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
A Comparison of the Methods for Estimation of Reliability Function for Burr-XII Distribution by Using Simulation.
...Show More Authors

This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values

View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Physical Education
The Effect Of Compound Exercises Using Visual Training Aid On Tactical Performance Of Deaf Soccer League Players
...Show More Authors

S Ali…, Journal of Physical Education, 2019 - Cited by 1

View Publication
Publication Date
Thu Sep 01 2011
Journal Name
Al-rafidain Dental Journal
The Effect of Two Bonding Agents Generations On Microleakage Of Composite Resin Using Two Light Curing Systems.
...Show More Authors

Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Studying the Microstructure of Al-Ti Alloy Prepared by Powder Metallurgy using Three Different Percentages of Ti
...Show More Authors

The effect of different Ti additions on the microstructure of Al-Ti alloy prepared by powder metallurgy was investigated. A certain amount of Ti (10wt%, 15wt%, and 20wt%) were added to aluminium and the tests like microhardness, density, scanning electron microscope (SEM), optical microscope (OM) and X-Ray Diffraction (XRD) were conducted to determine the influence of different Ti additives on the Al-Ti alloy properties and microstructure. The results show that the grains of α-Al changed from large grains to roughly spherical and then to small rounded grains with increasing Ti content, the micro-hardness of the alloy increases with increasing Ti, and XRD results confirm the formation of TiAl3 intermetallic co

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Electrochemical Science
Effect of Electrolysis Parameters on the Specific Surface Area of Nickel Powder: Optimization using Box-Behnken Design
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Investigating of Charge Transfer in Cu/F8 Using Donor-Acceptor Model due Quantum Transition
...Show More Authors

in this paper, we study and investigate a simple donor-acceptor model for charge transfer formation using a quantum transition theory. The transfer parameters which enhanced the charge transfer and the rate of the charge transfer have been calculated. Then, we study the net charge transfer through interface of Cu/F8 contact devices and evaluate all transfer coefficients. The charge transfer rate of transfer processes is found to be dominated in the low orientation free energy and increased a little in decreased potential at interface comparison to the high potential at interface. The increased transition energy results in increasing the orientation of Cu to F8. The transfer in the system was more active when the system has large driving for

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref