198 research outputs found

    The functional anatomy of hip abductors

    Get PDF
    The gluteal region was dissected in 18 adult cadavers. The attachments, directions, and orientations of the fibres of the tensor fasciae latae, gluteus medius, and gluteus minimus muscles were noted. The gluteus medius was found to be formed of three distinct parts, while the gluteus minimus was formed of two parts only; each part of these muscles had its separate innervations from the superior gluteal nerve. The tensor fasciae latae muscle arose from the anterior part of the outer lip of the iliac crest and was attached to the iliotibial tract slightly below and in front of the greater trochanter. The direction of the fibres of the anterior and middle parts of the gluteus medius and the anterior part of the gluteus minimus suggested that they have vertical pull and initiate abduction which is then completed by the tensor fasciae latae. The function of the posterior parts of the gluteus medius and minimus, being parallel to the neck of the femur, would be stabilization of the femoral head in the acetabulum during the different stages of the gait cycle. By resolving the line of action of the tensor fasciae latae muscle, it was found to help the muscle to fix the hip and femur together during the stance phase and to counteract the weight of the body during standing position

    Anatomical localisation of the marginal mandibular branch of the facial nerve

    Get PDF
    The marginal mandibular nerve was studied post mortem in 50 human subjects. The nerve was found to be presented by one branch (32%), two branches (40%) and three branches (28%). The relationship of the nerve to the lower border of the mandible was variable: it was either totally above the lower border of the mandible (28%), below the mandible (44%) or in 28% of cases lying above and below it. The branch which lay below the lower border of the mandible crossed it opposite the masseter muscle or opposite the facial artery or else anterior to the facial artery. The branches which lay above the lower border of the mandible were always deep into the superficial layer of the parotid fascia, while below the mandible all the branches ran intrafascially. The termination of the nerve was always deep to the muscles of the lower lip. The results of the present study were discussed and correlated with the results of other authors from the anatomical and surgical points of view. It is concluded that the lower border of the mandible can serve as an important landmark to help avoid injury to the nerve; above it a subplatysmal flap is satisfactory but below it a subfascial flap is much safer

    Combined Laplace Transform-Homotopy Perturbation Method for Sine-Gordon Equation

    Get PDF
    In this paper, the combined Laplace transform-homotopy perturbation method C(LT-HPM) is presented and used to solve the initial value problem for the sine-Gordon equation to obtain the approximate-exact solutions. The results obtained show the reliability and the efficiency of this method

    POLA ASUH ORANGTUA TERHADAP GANGGUAN PERILAKU ANAK USIA DINI

    Get PDF
    Penelitian ini bertujuan untuk mengetahui hubungan pola pengasuhan orangtua terhadap gangguan perilaku anak usia dini. penelitian ini menggunakan penelitian kualitatif deskriptif dengan teknik pengumpulan data penyebaran angket kuesioner kepada orangtua yang memiliki anak usia dini. Hasil penelitian menunjukkan adanya keterkaitan antara gangguan perilaku yang dialami anak dengan gaya pola pengasuhan yang diterapkan oleh orangtua kepada anaknya. Maka dari itu, agar anak tidak mengalami gangguan perilaku sebaiknya orangtua harus cerdas dalam memilih pola asuh yang ingin diterapkan kepada anak

    Efficient simultaneous encryption and compression of digital videos in computationally constrained applications

    Get PDF
    This thesis is concerned with the secure video transmission over open and wireless network channels. This would facilitate adequate interaction in computationally constrained applications among trusted entities such as in disaster/conflict zones, secure airborne transmission of videos for intelligence/security or surveillance purposes, and secure video communication for law enforcing agencies in crime fighting or in proactive forensics. Video content is generally too large and vulnerable to eavesdropping when transmitted over open network channels so that compression and encryption become very essential for storage and/or transmission. In terms of security, wireless channels, are more vulnerable than other kinds of mediums to a variety of attacks and eavesdropping. Since wireless communication is the main mode in the above applications, protecting video transmissions from unauthorized access through such network channels is a must. The main and multi-faceted challenges that one faces in implementing such a task are related to competing, and to some extent conflicting, requirements of a number of standard control factors relating to the constrained bandwidth, reasonably high image quality at the receiving end, the execution time, and robustness against security attacks. Applying both compression and encryption techniques simultaneously is a very tough challenge due to the fact that we need to optimize the compression ratio, time complexity, security and the quality simultaneously. There are different available image/video compression schemes that provide reasonable compression while attempting to maintain image quality, such as JPEG, MPEG and JPEG2000. The main approach to video compression is based on detecting and removing spatial correlation within the video frames as well as temporal correlations across the video frames. Temporal correlations are expected to be more evident across sequences of frames captured within a short period of time (often a fraction of a second). Correlation can be measured in terms of similarity between blocks of pixels. Frequency domain transforms such as the Discrete Cosine Transform (DCT) and the Discrete Wavelet Transform (DWT) have both been used restructure the frequency content (coefficients) to become amenable for efficient detection. JPEG and MPEG use DCT while JPEG2000 uses DWT. Removing spatial/temporal correlation encodes only one block from each class of equivalent (i.e. similar) blocks and remembering the position of all other block within the equivalence class. JPEG2000 compressed images achieve higher image quality than JPEG for the same compression ratios, while DCT based coding suffer from noticeable distortion at high compression ratio but when applied to any block it is easy to isolate the significant coefficients from the non-significant ones. Efficient video encryption in computationally constrained applications is another challenge on its own. It has long been recognised that selective encryption is the only viable approach to deal with the overwhelming file size. Selection can be made in the spatial or frequency domain. Efficiency of simultaneous compression and encryption is a good reason for us to apply selective encryption in the frequency domain. In this thesis we develop a hybrid of DWT and DCT for improved image/video compression in terms of image quality, compression ratio, bandwidth, and efficiency. We shall also investigate other techniques that have similar properties to the DCT in terms of representation of significant wavelet coefficients. The statistical properties of wavelet transform high frequency sub-bands provide one such approach, and we also propose phase sensing as another alternative but very efficient scheme. Simultaneous compression and encryption, in our investigations, were aimed at finding the best way of applying these two tasks in parallel by selecting some wavelet sub-bands for encryptions and applying compression on the other sub-bands. Since most spatial/temporal correlation appear in the high frequency wavelet sub-bands and the LL sub-bands of wavelet transformed images approximate the original images then we select the LL-sub-band data for encryption and the non-LL high frequency sub-band coefficients for compression. We also follow the common practice of using stream ciphers to meet efficiency requirements of real-time transmission. For key stream generation we investigated a number of schemes and the ultimate choice will depend on robustness to attacks. The still image (i.e. RF’s) are compressed with a modified EZW wavelet scheme by applying the DCT on the blocks of the wavelet sub-bands, selecting appropriate thresholds for determining significance of coefficients, and encrypting the EZW thresholds only with a simple 10-bit LFSR cipher This scheme is reasonably efficient in terms of processing time, compression ratio, image quality, as well was security robustness against statistical and frequency attack. However, many areas for improvements were identified as necessary to achieve the objectives of the thesis. Through a process of refinement we developed and tested 3 different secure efficient video compression schemes, whereby at each step we improve the performance of the scheme in the previous step. Extensive experiments are conducted to test performance of the new scheme, at each refined stage, in terms of efficiency, compression ratio, image quality, and security robustness. Depending on the aspects of compression that needs improvement at each refinement step, we replaced the previous block coding scheme with a more appropriate one from among the 3 above mentioned schemes (i.e. DCT, Edge sensing and phase sensing) for the reference frames or the non-reference ones. In subsequent refinement steps we apply encryption to a slightly expanded LL-sub-band using successively more secure stream ciphers, but with different approaches to key stream generation. In the first refinement step, encryption utilized two LFSRs seeded with three secret keys to scramble the significant wavelet LL-coefficients multiple times. In the second approach, the encryption algorithm utilises LFSR to scramble the wavelet coefficients of the edges extracted from the low frequency sub-band. These edges are mapped from the high frequency sub-bands using different threshold. Finally, use a version of the A5 cipher combined with chaotic logistic map to encrypt the significant parameters of the LL sub-band. Our empirical results show that the refinement process achieves the ultimate objectives of the thesis, i.e. efficient secure video compression scheme that is scalable in terms of the frame size at about 100 fps and satisfying the following features; high compression, reasonable quality, and resistance to the statistical, frequency and the brute force attack with low computational processing. Although image quality fluctuates depending on video complexity, in the conclusion we recommend an adaptive implementation of our scheme. Although this thesis does not deal with transmission tasks but the efficiency achieved in terms of video encryption and compression time as well as in compression ratios will be sufficient for real-time secure transmission of video using commercially available mobile computing devices

    Molecular Identification of Rhizobium Isolates and The Effect of Nanoparticles on Growth and Differentiation

    Get PDF
    In this study, five isolates of Rhizobium bacteria were isolated from several different agricultural regions of Nineveh Governorate. The five isolates showed their ability to dilute gelatin, as well as a positive result of the growth test on a triglyceride medium and iron showed their ability to produce catalase and urease enzyme, and the results of the molecular diagnosis showed The isolates are identical and in varying proportions to the standard isolates recorded in the GenBank, and the biological activity of silver nanoparticles showed a clear antagonistic effect on the growth of rhizobium bacteria, where the first concentration (250) was the least effect, while the third concentration (750) had the highest effect ratio

    Study on some predelivery immunoparameters in pregnant women in Al-Ramadi city

    Get PDF
    Serum Protein plays major role to maintain balance of blood, so total protein may be elevated or decreased due to some pathological & physiological changes in human body during pregnancy period. On the other hand the serological diagnosis of antibodies level during pregnancy is usually based on the detection of IgG and IgM antibodies as markers for diagnosis. The aim of this study was to investigate some immunoparameters including IgM, IgG, and assay of TSP, TSA & TSG in pregnant women attending Maternity & Child Hospital in Ramadi City, West of Iraq. Sera of 50 pregnant women were collected & quantitative assays by Single Radial Immunodiffusion test (Mancini test) for detection of (IgM & IgG) concentration & spectrophotometric method for Total serum protein, Total serum Albumin & Total serum Globulin reader were achieved against these serum samples.Serum immunoglobulin (IgM & IgG) were measured in 50 pregnant women. (22) with natural delivery & (28) Cesarean delivery pregnant women. The mean IgG level was increased in pregnant women aged under 25 years, while IgM levels were markedly increased at (25-39) years. A total mean titer for IgG & IgM were found to be 1006.2071± 408.12282 & 48.8571±28.81962 respectively.Total serum protein reports separate values for total protein , albumin & Globulin. Values of serum protein reflect high globulin concentration, while albumin concentration in pregnant women recorded significant differences It is mean values for age group (15-24) & (25- 39) years are 3.4479 ± .72373 & 3.0044±.33212 respectively. There was significant differences in albumin concentration through age group in pregnant women. Most values of serum routine liver function tests during normal pregnancy remain below the upper normal limits in no pregnant women. When liver disease is suspected & considered pathologic further should prompt evaluation. Furthermore, IgG concentration was predominantly increase in their level during pregnancy in association with transported IgG through placenta to the fetus during late pregnancy perio

    Origin of profunda femoris artery and its circumflex femoral branches: anatomical variations and clinical significance

    Get PDF
    Background: Knowledge of the anatomical variations of the profunda femoris artery and its circumflex branches is important during angiographic diagnostic procedures as well as during performing surgery in the femoral region. The aim of this study was to examine the original sites, distances and variations of the profunda femoris artery and its circumflex branches. Materials and methods: The study was conducted in the Department of Anatomy, Faculty of Medicine, King Abdulaziz University from October, 2011 to May, 2013 after the approval of the medical ethical committee. Dissections of 90 femoral triangles of 25 male and 20 female adult human cadavers were performed to demonstrate the origin and distribution of the profunda femoris artery and its circumflex branches. Results: The profunda femoris artery mostly originated from the posterolateral aspect of the femoral artery in 42% of male limbs and in 42.5% of female limbs, from the posterior side in 24% of male and 27.5% of female limbs, from the lateral side in 20% of males and female limbs and from the posteromedial aspect in 14% of male limbs and in 7.5% of female limbs. The mean distance of origin of profunda femoris artery from the midpoint of inguinal ligament was 51.5 ± 1.9 mm in right male, 49.7 ± 1.9 mm in left male, 48.5 ± 2.2 mm in right female and 48.9 ± 2.2 mm in left female limbs. The medial and lateral circumflex arteries originated mostly from the profunda femoris artery (60% in males; 57.7% in females) at a mean distance of 18.6 ± 2.1 mm and 20.2 ± 2.2 mm in right male, 19.6 ± 1.9 mm and 22.5 ± 2.3 mm in left male, 18.8 ± 2.7 mm and 21 ± 2.6 mm in right female and 19.1 ± 2.1 mm and 21.7 ± 2.6 mm in left female limbs, respectively. The original incidence of the medial and lateral circumflex femoral arteries from the femoral artery including the common trunk was 40% in male and 42.3% in female limbs. Conclusions: Awareness of the original sites and distances of the profunda femoris artery and its circumflex femoral branches will allow the surgeon to define the vascular pattern before performing any invasive procedure and to avoid unexpected iatrogenic injuries

    Conceptual Metaphor of Window and Frame in The Poem Collection: “What the Barefoot Heart Sees in the Time of Shoes”

    Get PDF
    نهضت الاستعارة الإدراكية أو المعرفية كما جاءت عند لايكوف على نموذج معرفي يتبلور حول قدرة اللغة وكفاءتها على التوسع الانزياحي، والمجازي، والاستعاري، التي يمكن أن تمثل أقانيم وقوالب تحتوي أطرا مفاهيمية تختزل الواقع في اللغة، فالعالم الواقعي استعارة كبيرة وكل شيء يتداول فيه يعدّ لغة استعارية من حيث تحديد الجهات المكانية، والزمانية، والتعبيرات الحياتية، ومصطلحاها التداولية، فاللغة المرآة المعرفية العاكسة لمتطلبات الإدراك والفهم، فالشاعر عياش يحياوي في (ديوانه ما يراه القلب الحافي في زمن الأحذية)، اختزل الواقع في تشكيل استعاري معرفي يكشف عن النافذة والإطار، فاستعارة النافذة هي في الحقيقة مجالات معرفية متنوعة: البيت، والوطن، والفقر، والصعلكة، والمراقبة، والسلطة، والسرقة، وحدود الوطن وجغرافيته، واستعارة الإطار هي الحافة، والهجرة، والابتعاد، والناصية، والشرفة، والغياب، والتهميش، والقيد، والاحتواء، والحصار وكلها معان تختزل الواقع وتكشف عن ماهية التعرف على الواقع الجزائري، والاحتراق النفسي أو الداخلي والغربة والاغتراب، وما تعانيه الذات المنكسرة والمتشظية بين طموحات بناء المجتمع وتقدمه ومحاربة كل أنواع الظلم الاجتماعي والسياسي، والبحث عن الحرية والعدالة الاجتماعية, التي اختزلت في حكاية شحاذ أو متسول تمثّل وطنه في حدود، أو أطر ضيقة بمساحة الكرتون .Perceptual or epistemological metaphor, as it came to Lakoff, arose on a cognitive model that crystallized around the ability and competence of language to expand shifting, metaphor, and metaphor, which could represent persons and templates that contain conceptual frameworks that summarize reality in language, so the real world is a great metaphor and everything circulating in it is considered a language An allegorical one in terms of defining the spatial and temporal entities, and life expressions, and their deliberative terminology. Language is the epistemological mirror reflecting the requirements of perception and understanding. The poet Ayyash lives in (his poetry what the barefoot heart sees in the time of shoes) reduced reality to an allegorical cognitive formation that reveals the window and frame, so the metaphor of the window They are, in fact, various fields of knowledge: the home, the homeland, poverty, the traumatization, the surveillance, the power, the theft, the borders and the geography of the homeland, the frame metaphor is the edge, the migration, the distance, the forelock, the balcony, the absence, the marginalization, the restriction, the containment, the siege, all of which are meanings that are reduced Reality and it reveals what is known as the Algerian reality, psychological or internal combustion, estrangement and alienation, and what the broken and fragmented self-suffers from among aspirations Building and advancing society, combating all kinds of social and political injustice, and the search for freedom and social justice that were reduced to the story of a beggar or beggar whose homeland is represented within borders, or a narrow frame the size of a carton
    corecore