Fractional Er: YAG laser resurfacing is increasingly used for treating rhytides and photo aged skin because of its favorable benefit‐risk ratio. The multi-stacking and variable pulse width technology opened a wide horizon of rejuvenation treatments using this type of laser. To evaluate the efficacy and safety of the use of fractional 2940 nm Er: YAG laser in facial skin rejuvenation. Twelve female patients with mean age 48.3 years and multiple degrees of aging signs and solar skin damages, were treated with 2 sessions, one month apart by fractional Er: YAG laser. Each session consisted of 2 steps, the first step employed the use of the multi stack ablative fractional mode and the fractional long pulsed non-ablative mode settings were used in the second step. The results were assessed 4-8weeks after the last session by using the wrinkles assessment scale improvement, the improvement in the degree of dyschromia and keratosis, the degree of patients' satisfaction and rate of complications. The mean improvement in Wrinkles assessment scale was very satisfying. The improvement in keratosis was good to excellent in 66.7% of patients compared to 33.3% of patients who were mildly to moderately improved. Dyschromia improvement, 50% of the patients had good to excellent results versus 50% who had mild to moderate improvement. 75% of patients were well satisfied, 16.6% were moderately satisfied and 8.3% were unsatisfied. Total incidence of complications was 16.6%, where 1 patient had herpes infection and a second patient had milia. The use of Er: YAG laser in fractional ablative and fractional long pulse non ablative modes for facial rejuvenation is an effective, safe, with short down time and low complication rate.
Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThis paper investigates the interaction between fiscal and monetary policy in Iraq after 2003 using the prisoner’s dilemma.The paper aims to determine the best form of coordination between these policies to achieve their goals; payoff matrix for both policies was constructed. To achieve the purpose, the quantitative approach was applied using several methods, including regression, building payoff matrices and decision analysis using a number of software.The results of the monetary policy payment function show that inflation rate has an inverse relationship with the auctions of selling foreign currency and a positive relationship with the government’s activity, while the fiscal policy function shows that real growth is positively
... Show MoreLead remediation was achieved using simple cost, effective and eco-friendly way from industrial wastewater. Phragmitesaustralis (P.a) (Iraqi plant), was used as anovel biomaterial to remove lead ions from synthesized waste water. Different parameters which affected on adsorption processes were investigated like adsorbent dose, pH, contact time, and adsorbent particle size, to reach the optimized conditions (maximum adsorption). The adsorption of Pb (?) on (P.a) involved fast and slow process as a mechanism steps according to obey two theoretical adsorption isotherms; Langmuir and Freundlich. The thermos dynamic adsorption parameters were evaluated also. The (?H) obtained positive value that meanes adsorption of lead ions was an endothermic
... Show MoreAbstract: Recently, there is increasing interest in using mode-division multipelexing (MDM) technique to enhace data rate transmission over multimode fibers. In this technique, each fiber mode is treated as a separate optical carrier to transfer its own data. This paper presents a broadband, compact, and low loss three-mode (de)multiplexer designed for C+L band using subwavelength grating (SWG) technology and built-in silicon-on-insulator SOI platform. SWG offers refractive index engineering for wider operating bandwidth and compact devices compared to conventional ones. The designed (de)multiplex deals with three modes (TE0, TE1, and TE2) and has a loss > -1 dB and crosstalk < −15 dB, and its operation c
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More