Acne scars are one of the most common problems following acne vulgaris. Despite the extensive list of available treatment modalities, their effectiveness depends upon the nature of the scar. Ablative lasers had been used to treat acne scars; one of them is the fractional CO2 laser. The aim of this study is to evaluate the outcome of fractional CO2 laser in the treatment of acne scars. Methods: Since January 2010 to June 2013, using 10600 nm fractional CO2 laser beams, the acne scar of 400 patients, 188 males and 212 females, mean age of 34 years, have been treated and classified according to severity into four grades following Goodman and Baron classification. Each patient underwent 3-5 sessions once monthly. The mean laser exposure time was 15 minutes, mean operative time was 1-1.5 hours, no hospital stay and the treatment coarse lasted 3-5 months. Patients were followed up for about one year to evaluate the success of the procedure. Results: Investigators and patients graded the improvement on a scale (0=no improvement to grade1 0-25%, grade 2, 25-50% ,grade 3 50-75%,grade 4 more than 75%. Both investigators and patients gave mean improvement scores in the range of 50% to 75% for scar depth, scar margins beveling, better color match, texture, skin tightness and overall improvement of the patients well looking. The degree of improvement increased with each treatment session and continued to increase between the 1-month and 3-month after the last treatment. Conclusion Fraction ablative resurfacing seems to hit a sweet spot between the minimal benefits of traditional nonablative laser treatment and the considerable downtime and complications of ablative resurfacing.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe exploitation of all available resources and benefiting from them is one of the most important problems facing the decision makers at the present time. In order to exploit these resources, it is necessary to organize the conflicting objectives, which is the main work in the project management, which enables the development of a plan that decision makers can use to shorten the total completion time and reduce the total cost of the project. Through the use of modern scientific techniques, and therefore the researcher using the critical path method using the technology of programming goals to find more efficient ways to make appropriate decisions where the researcher worked to solve the problems in the construction of the Departm
... Show MoreAbstract:-
The approach maintenance and replacement one of techniques of operations research whom cares of the failure experienced by a lot of production lines which consist of a set of machines and equipment, which in turn exposed to the failure or work stoppages over the lifetime, which requires reducing the working time of these machines or equipment below what can or conuct maintenance process once in a while or a replacement for one part of the machine or replace one of the machines in production lines. In this research is the study of the failure s that occur in some parts of one of the machines for the General Company for Vege
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreObjective:To measure the acceptance level of the Personal Digital Assistance (PDA)’suse among nursing students as a tool of education in the Kingdom of Saudi Arabia. Methodology: Eighty-nine nursing students participated in this cross-sectional descriptive study by completing a questionnaire based on the Technology Acceptance Model (TAM) by Davis. Two dimensions were explored and evaluated; (1) the applicability of the TAM model in assessing this technology; and (2) the overall percentage of students’ agreement on the different TAM variables. Results: This study presented significant positive influence bet
The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreTo achieve the objectives of the study, a non –probability (purposive) sample of (50) nurses were selected those were working at the oncology wards at the above listed hospitals. The data selected according to the criteria of the study sample. The validity of the questionnaire was determined through an expert panel consists of (11) specialist expert and its reliability was determined through a pilot study by test – retest which was estimated as averages (R=0.89). Data was collected by direct interview technique using the questionnaire formal and data was analyzed by application of descriptive & inferential statistical methods (frequency, percentage, mean of score and Chi-Square). The resul
... Show MoreThe current research aims to measure the impact of the skills of human resources management professionals in information technology in Iraqi private banks, as the skills of human resources management professionals constitute the modern trend of banks' interest in employees with outstanding performance, and the presence of information technology in banks is a prerequisite for dealing with the huge amount of data. And converting it into information to support the decision-maker in light of a complex environment, and the field research problem was the presence of a clear lack of interest in the skills of human resource management professionals and the weak adoption of information technology, which was reflected negatively on the compet
... Show MoreSeveral studies have indicated that more than 600 cities in the world (intermas of rapid growth and development) will generate about 60% of international economic growth between 2010 and 2025 . by 2025 , 66% of the worlds population will live in urban areas the management of cities will face challenges that accompany this increase in the population which requires preparing to face these challenges and problems and the need to provide the aim of the research to know the readiness of Baghdad city to implement the strategies of urban management throught on asmple representing the ( Advisiry group for the comprechnsive development plan for the city of Baghdad 2030 and its supporters ) in the municipality of Baghdad and the number of
... Show More