Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.
The study aimed to evaluate the level of MMP‑2 in acute myeloid leukemia (AML) patients in comparison with that in remission status, and healthy subjects, and to find its correlation with hematologic parameters. This study included sixty newly diagnosed AML patients. Remission status was assessed after induction chemotherapy. The overall survival (OS) was determined after 6 months. The plasma MMP‑2 level was measured at diagnosis by enzyme immunoassay. Twenty‑eight healthy individuals were recruited as a control group. Plasma MMP‑2 was higher in AML patients than in healthy individuals (P = 0.005). The level of MMP‑2 was much higher in the M5 subtype than in the other subtypes (P = 0.0001). There was no statistically significant d
... Show MoreExperienced organizations in recent years, significant challenges , especially with the spread of economic globalization, making it required to provide new and better through experience , creativity and innovation to achieve the quality and high-quality products of all kinds , in order to achieve the objectives of the study and to answer its questions tested the study in the woolen Industries sector in Baghdad . The study was applied to a sample of 30 people in the senior management and the middle and lower in the company (managers of sections , and managers of people , and managers of the units , and office managers ) and for the processing of data and information used several statistical methods and extracted result
... Show MoreQuick and accurate quaternary mixture resolution of furosemide (FURO), carbamazepine (CARB), diazepam (DIAZ) and carvedilol (CARV) by using derivative spectrophotometric method was performed. FURO and CARV were determined by means of first (D1), second (D2), third (D3) and fourth (D4) derivative spectrophotometric methods, CARB was determined by using D1, D2, D3 derivatives, while D1 and D2 were used for the determination of DIAZ. The recommended methods were verified using laboratory prepared mixtures and then successfully applied for the pharmaceutical formulations analysis of the cited drugs. The results obtained revealed the efficiency of the proposed methods as quantitative tool of analysis of the quaternary mixture with no requirement
... Show MoreIn this research is estimated the function of reliability dynamic of multi state systems and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of
Complex-valued regular functions that are normalized in the open unit disk are vastly studied. The current study introduces a new fractional integrodifferential (non-linear) operator. Based on the pre-Schwarzian derivative, certain appropriate stipulations on the parameters included in this con-structed operator to be univalent and bounded are investigated and determined.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the