Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs and two modes of application (helical and radial) to assess the optimal power density and the best mode of application. The second group consisted of 75 lesions treated with output of 10 W continuous mode using helical mode of application.
Results: The optimal power was found to be 10 W. In the second group of patients, after 1 - 6 passes of laser (median 2.8 pass), complete clearance of the lesion was noticed in 56 lesions with a cure rate of 74.6%. This was found in 32 (68%) recalcitrant lesions and 24 (85.7%) lesions that had no previous treatment. The main complications were scarring in 17(22.5%) lesions and hyperpigmentation in 7 (12.5%) lesions. Post-operative infection was noticed in 4 (6%) lesions that were larger than 2 cm in diameter.
Conclusion: Carbon dioxide laser therapy of recalcitrant and extensive viral warts should be considered as a viable alternative to other more traditional techniques. This treatment offers good results in eliminating the verrucae and minimizing the squeals of recurrence, scarring and the post-operative pain.
Titanium dioxide nanotubes were synthesized by anodizing Ti sheets in the ethylene glycol solution and were covered in Pt nanoparticles onto the surface of TiO2NTs using electrodeposition method from using five derivatives of Mannich base Pt complexes which have been used as precursor of platinum. The mean size, shape, elemental composition of the titanium dioxide nanotubes and platinum deposited on the template were evaluated by different techniques such as field emission scanning electron microscope (FE-SEM), transmission electron microscopy (TEM), X-ray diffraction pattern (XRD), and energy dispersive X-ray (EDX) technique. From all these analyses, the TiO2NTs prepared and Ptnanoparticles deposited on it were ide
... Show MoreBackground Alloys with the addition of zirconium and niobium eliminate the adverse effects of aluminum and vanadium on the nervous system, the possibility of metallosis and the initiation of diseases (including cancers or Alzheimer›s disease). In addition, they have better corrosion resistance, and a Young›s modulus value similar to longitudinal bone tissue. Therefore, only choosing appropriate materials does not guarantee proper functioning of the implants, the surfaces of the implants also have to be suitable to meet the requirements. The laser surface hardening process modifies the surface properties by imparting microstructural changes, whereas surface remelting induces changes in the surface topography, roughness, wettability and w
... Show MoreThis research focuses on improvement of the corrosion behaviour of commercial pure titanium (Ti) grade II when exposed to Hank’s solution through different surface treatments. The disc shape of titanium samples were constructed to be divided according to their surface treatment. The first experimental group the Ti sample was exposed to computer numerical control (CNC) fiber laser machine. Whereas, the other experimental group the Ti sample was only coated with Polyetherketon keton (PEKK) by using carbon dioxide (CO2) laser technique while the last experimental group the Ti sample was treated with CNC fiber laser followed by PEKK coating by using CO2 laser technique. All were compared with the untreated control group. The electrochemical a
... Show MoreFar infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MoreContinuous functions are novel concepts in topology. Many topologists contributed to the theory of continuous functions in topology. The present authors continued the study on continuous functions by utilizing the concept of gpα-closed sets in topology and introduced the concepts of weakly, subweakly and almost continuous functions. Further, the properties of these functions are established.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreEstimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreElzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.
Knowledge of the mineralogical composition of a petroleum reservoir's formation is crucial for the petrophysical evaluation of the reservoir. The Mishrif formation, which is prevalent in the Middle East, is renowned for its mineralogical complexity. Multi-mineral inversion, which combines multiple logs and inversions for multiple minerals at once, can make it easier to figure out what minerals are in the Mishrif Formation. This method could help identify minerals better and give more information about the minerals that make up the formation. In this study, an error model is used to find a link between the measurements of the tools and the petrophysical parameters. An error minimization procedure is subsequently applied to determine
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More