Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs and two modes of application (helical and radial) to assess the optimal power density and the best mode of application. The second group consisted of 75 lesions treated with output of 10 W continuous mode using helical mode of application.
Results: The optimal power was found to be 10 W. In the second group of patients, after 1 - 6 passes of laser (median 2.8 pass), complete clearance of the lesion was noticed in 56 lesions with a cure rate of 74.6%. This was found in 32 (68%) recalcitrant lesions and 24 (85.7%) lesions that had no previous treatment. The main complications were scarring in 17(22.5%) lesions and hyperpigmentation in 7 (12.5%) lesions. Post-operative infection was noticed in 4 (6%) lesions that were larger than 2 cm in diameter.
Conclusion: Carbon dioxide laser therapy of recalcitrant and extensive viral warts should be considered as a viable alternative to other more traditional techniques. This treatment offers good results in eliminating the verrucae and minimizing the squeals of recurrence, scarring and the post-operative pain.
Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreAbstract The study aimed at demonstrating the reality of sectarian coexistence in Iraq, which was characterized by the tolerance and coercion caused by the successive government policies to govern Iraq and to this day. The study was based on the hypothesis that coexistence between Islamic sects in Iraq can be achieved as long as there are strong bonds linking its components, and these bonds can produce coexistence between the sects based on peace. The study concluded that the hypothesis is correct, in addition to drawing a set of observations aimed at identifying weaknesses for advancing them through the adoption of mechanisms that address these weaknesses to yield towards a genuine peaceful coexistence among Islamic sects in Iraq.
Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show MoreIn this paper a prey - predator model with harvesting on predator species with infectious disease in prey population only has been proposed and analyzed. Further, in this model, Holling type-IV functional response for the predation of susceptible prey and Lotka-Volterra functional response for the predation of infected prey as well as linear incidence rate for describing the transition of disease are used. Our aim is to study the effect of harvesting and disease on the dynamics of this model.
Utilizing phase change materials in thermal energy storage systems is commonly considered as an alternative solution for the effective use of energy. This study presents numerical simulations of the charging process for a multitube latent heat thermal energy storage system. A thermal energy storage model, consisting of five tubes of heat transfer fluids, was investigated using Rubitherm phase change material (RT35) as the. The locations of the tubes were optimized by applying the Taguchi method. The thermal behavior of the unit was evaluated by considering the liquid fraction graphs, streamlines, and isotherm contours. The numerical model was first verified compared with existed experimental data from the literature. The outcomes re
... Show MoreThe rapid increase in the number of older people with Alzheimer's disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems. Early detection of AD makes it possible for patients to access appropriate services and to benefit from new treatments and therapies, as and when they become available. The onset of AD starts many years before the clinical symptoms become clear. A biomarker that can measure the brain changes in this period would be useful for early diagnosis of AD. Potentially, the electroencephalogram (EEG) can play a valuable role in early detection of AD. Damage in the brain due to AD leads to changes in the information processing activity of the brain and the EEG which ca
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreBackground: Selenium-73 with half- life of 7.15 hour emits β+ in nature and has six stable isotopes which are ( 74Se,76Se,77Se,78Se,80Se and 82Se ). Selenium-73 has many applications in technology and radioselenium compounds of metallic have found various applications in medicine. Objective: To make a comparison between different reactions that produced cross sections of Se-73 radioisotopes. Subjects and methods: The feasibility of the production of Selenium -73 via various nuclear reactions was investigated. Excitation functions of 73Se production by the reactions of 75As (p,3n), 169Tm( d,x), 74Se, natSe, natBr (p,x) , 75As (d,4n), natGe (3He,x), 70Ge (α, n), and 72Ge (α, 3n) and neutron capture were calculated using the avail
... Show More