Preferred Language
Articles
/
ijl-57
Treatment of Skin Scar Using CO2 Laser with or Without Corticosteroid
...Show More Authors

CO2 Laser (10600nm) is the recent method in the management of challenging skin scar resulting from trauma, burn and surgical wound. The aim of this study was to evaluate the efficacy & safety of fractional CO2 laser (10600nm) in treatment of skin scar. Materials and Methods:Twenty patients with different types of scars treated with fractional CO2 (10600nm) laser, (10 patients) were given additional intralesional Triamcinolone. Results: All of the twenty patients included in this study showed some sort of improvements in scar texture, height and pliability and all of the ten patients who received intralesional Triamcinolone after laser show complete satisfaction. Conclusion:Fractional CO2 (10600nm) laser can be used as alternative, effective, safe and less side effects method to other conventional method in treatment of scar specially when combined with intralesional Triamcinolone.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A study of Hepcidin levels and other Biochemical parameters in woman with Osteoporosis with Type 2 Diabetes Mellitus
...Show More Authors

Background: Diabetes mellitus (DM) could be regarded as a set of chronic metabolic disorders which have a common aspect of hyperglycemia. The resistance in the peripheral actions of insulin or impaired insulin secretion could be the reason  hepcidin which is a peptide hormone derived from liver, in systemic iron homeostasis is an essential regulator, and its lopsided production participates in the pathogenesis of iron disorders in spectrum. Osteoporosis often accompanies many diseases like ß-thalassemia, hemochromatosis, sickle liver diseases, cell disease and hemosiderosis featured by iron overload, evidences suggest that Iron overload and iron deficiency are suggested by evidences that they affect bone in a negative way, acting

... Show More
View Publication
Publication Date
Tue Mar 31 2020
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Experimental and Theoretical Analysis of a Mono PV Cell with Five Parameters, Simulation Model Compatible with Iraqi Climate
...Show More Authors

The present work included study of the effects of weather conditions such as solar radiation and  ambient temperature on solar panels (monocrystalline 30 Watts) via proposed mathematical model, MATLAB_Simulation was used by scripts file to create a special code to solve the mathematical model , The latter is single –diode model (Five parameter) ,Where the effect of ambient temperature and solar radiation on the output of the solar panel was studied, the Newton Raphson method was used to find the  output current of the solar panel and plot P-V ,I-V curves, the performance of the PV was determined at Standard Test Condition (STC) (1000W/m2)and a comparison between theoretical and experimental results were done .The best efficiency

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Electro Cardiographic Features of Ptients With Tetralogy of Fallot
...Show More Authors

Background: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study.

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATING THE QUALITY OF IMPORTED AND LOCAL FLOUR IN TERMS OF QUALITY WITH IRON AND FOLIC ACID AND ITS COMPLIANCE WITH IRAQI STANDARD: EVALUATING THE QUALITY OF IMPORTED AND LOCAL FLOUR IN TERMS OF QUALITY WITH IRON AND FOLIC ACID AND ITS COMPLIANCE WITH IRAQI STANDARD
...Show More Authors

Food fortification has an important and necessary role in compensating for the shortage of nutritional micronutrients, especially in developing and least developed countries. So, 12 samples of flour available in the local market, whether imported or locally produced flour, were obtained during 2019. The amount of base metal of the necessary iron element in the flour models studied which are available in local markets, measured by spot testing and was compared with the values ​​that should be added according to the specification Iraqi standard. Results revealed the qualitative evaluation of iron in locally produced flour does not conform to the Iraqi standard and is almost free of any reinforcement. While the percentage of imp

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF