Analyzing plantar pressure trajectories is crucial for assessing foot behavior in dynamic gait stability. We propose the identification of foot symmetry and the detection of deformities by analyzing the trajectories of the center of pressure (CoP) and peak pressure (PP). First, using a foot pressure mapping system, plantar pressure data are acquired during a normal gait cycle. After the data have been acquired, post processing extracts both the CoP and PP trajectories over the spatiotemporal domain of foot motion for each foot independently. For this purpose, we used the optical flow technique which accurately estimates the direction of foot motion. The extracted trajectories of each foot are then segmented into, the medial and lateral regions. This segmentation is essential for assessing symmetries and deformities of the foot. Our focus is on two types of foot deformities, flat and high-arched which are compared with a control population that we used to evaluate any errors in our proposed approach. The results show that our hybrid symmetry index, which includes CoP and PP trajectories along the butterfly medial region, has better sensitivity than traditional metrics. The medial region analysis thus seems to more effective at distinguishing between pathological and normal gait patterns
Background: Common and persistent isolate ina the teeth following failed therapy of the root canal is the gram-positive facultative bacterium Enterococcus faecalis and Escherichia coli, which develop biofilm through a complicated process that results in the formation of a biofilm. Enterococcus faecalis and Escherichia coli are significant factors that cause chronic periradicular lesions after root canal therapy. Aim: This study aimed to treat the root canal tooth infected with Escherichia coli and Enterococcus faecalis Methods: In this study biofilm formation was done for Escherichia coli in growth phase cultured in a brain heart broth Enterococcus faecalis and Escherichia coli cultured in Luria-Bertani (LB) infusion medium for 18 hrs. Then
... Show MoreAbstract Background: One of the most important methods to replace lost teeth is dental implants. In order to increase the strength of connection of the implant with the jaw bone to provide early loading after placement, implant is coated by different coating materials that achieved that purpose. The aim of this study was to evaluate the influence of coating CP Ti implant with calcium carbonate on the strength of bone-implant interface after two and six weeks of implantation in rabbit femur bone by torque removal test, histological and histomorphometric analysis. Materials and methods: Coating the surface of commercially pure titanium screws with extra pure synthetic calcium carbonate via electrophoretic deposition method (EPD) was done. The
... Show MoreObjectives of the study: The present study aims to evaluate nurses’ knowledge about enteral feeding in critical care units.
Methodology
A descriptive study design was carried out in the critical care units at Al-Ramadi Teaching Hospital and Al-Fallujah Teaching Hospital of Al-Anbar Governorate for the period 6th of December 2020 to 5th of January 2021. A non-probability (purposive sample) consists of 32 nurses was selected based on the study criteria. The instrument consist of, the reliability of instrument was = 0.87.
The instrument consist of 30 items of knowledge about enteral
... Show MoreManagement Representations Letter plays a significant role as an evidence to get conclusions the Auditor is looking for. These conclusions could show the professional opinion of auditor over the fairness and integrity of financial statements for many issues and numbers that management claims, Hereby, the research aims at highlighting the importance of Management Representations Letter and the way of using as an evidence with expressing its meaning and means of application in addition to identify the Responsibility of Auditor on that Letter, This research discusses also the effect of Management Representations Letter on the credibility of financial statement and enhancing the credibility of the submitted reports, From other side, in the t
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More