KE Sharquie, AA Noaimi, Pigmentary Disorders, 2014 - Cited by 5
In the name of God, praise be to God, and prayers and peace be upon the best of God’s creation, Muhammad bin Abdullah, and upon his family and companions, and from his family:
And after:
He saw from verbs that transcend one effect if it is visual and to two effects if it is heart and this action has several strokes and it is an awareness of the sense and illusion and imagination and reason and in addition to that it has many meanings dealt with in the glossary books and as for what the verb included in the audio studies it is the explanation and deletion and slurring The heart of my place. As for what the grammatical studies included, it focuses on one or two effects according to its l
Vitiligo is an acquired idiopathic skin disorder characterized by depigmented macules due to loss of cutaneous melanocytes. A potential role of the immune dysfunction has been suggested in vitiligo, so to test this hypothesis, certain cytokines (IL-17A and TNF-?) and immunoglobulins (IgM, IgG, IgA and total IgE) were investigated in all participants. The study included: 60 patients with age range between (6-55) year; 30(11 males and 19 females) were untreated and 30(12 males and 18 females) were treated with Narrow Band Ultraviolet-B (NB-UVB) and 30 (14 males and 16 females) apparently healthy control. Serum was separated and cytokines (IL-17A and TNF-?) and total immunoglobulin E (IgE) were detected by using Enzyme Linked Immunosorbent Ass
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreSeveral schottky diodes were fabricated from polyaniline/ Carbon nanotube (single and multiwalled) composites. These composites were synthesized with different concentration and two carbon nanotubes types, Single and Multi-Walled Carbon Nanotubes (SWCNT & MWCNT). Aluminum and silver paste were chosen as schottky and ohmic contact respectively. physical and electrical were used to studied these composite by using Atomic Force Microscopy (AFM) and electrical measurements. The Root Mean Square RMS surface roughness of the composite samples was found to be around 4nm. The currentvoltage characteristic were measurements for all samples in the bias range ±15V at room temperature. The results shows the increasing in carbon nanotubes concentration
... Show MoreThis piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreThis study aims to analyze spectra in real-time for λ Draconids, σ Hydrids, μ Virginid, and one sporadic meteor using spectroscopic chemical analysis and diagnose plasma parameters. Good-resolution spectroscopy and a CCD camera for meteor observation were used concurrently to examine the ablation spectra of these meteorites in situ. The Boltzmann and Lorentz methods were then used to determine the temperature and density of electrons, the length of Debye, and the frequency of plasma. Furthermore, spectra data can be analyzed and compared to data from other sources. Spectrum tests can be utilized to identify the chemical structure of meteorites' plasma.
Ecolinguistics is a twofold field in which ecology and language are its two major concerns. That is, this field is concerned with the way through which our thoughts, ideologies and the like influence the environment. The present study aims at analyzing (6) constructive and destructive environmental advertisements to find out how the techniques of erasure and salience operate in these types of advertisements. It studies the linguistic expressions that achieve these techniques in the constructive and destructive advertisements. The qualitative and quantitative methods are exploited in the current study. Analyzing (6) constructive and destructive environmental advertisements in accordance with Stibbe’s (2015) model of salience and erasure
... Show MoreCancer is one of the dangerous diseases that afflict a person through injury to cells and tissues in the body, where a person is vulnerable to infection in any age group, and it is not easy to control and multiply between cells and spread to the body. In spite of the great progress in medical studies interested in this aspect, the options for those with this disease are few and difficult, as they require significant financial costs for health services and for treatment that is difficult to provide.
This study dealt with the determinants of liver cancer by relying on the data of cancerous tumours taken from the Iraqi Center for Oncology in the Ministry of Health 2017. Survival analysis has been used as a m
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More