Preferred Language
Articles
/
ijl-239
Treatment of facial acne scar using Fractional Er: YAG laser
...Show More Authors

Background: Acne is a common disorder experienced by adolescents and persists into adulthood in approximately 12%–14% of cases with psychological and social implications of high gravity. Fractional resurfacing employs a unique mechanism of action that repairs a fraction of skin at a time. The untreated healthy skin remains intact and actually aids the repair process, promoting rapid healing with only a day or two of downtime. Aims: This study, was designed to evaluate the safety and effectiveness of fractional photothermolysis (fractionated Er: YAG laser 2940nm) in treating atrophic acne scars. Methods: 7 females and 3 males with moderate to severe atrophic acne scarring were enrolled in this study that attained private clinic for Dermatology and Laser in Baqubah city of Diyala - Iraq during the period from 1st of June 2019 to 10th of October 2019. Fractional Er:YAG laser 2940 nm wavelength was delivered to the whole face with a single pass treatment and for the acne scar areas with two passes. Therapeutic outcomes were assessed by standardized digital photography. Results: Three patients (30%) reported excellent improvement, five patients (50%) significant improvement, one patient (10%) moderate improvement, and one patient (10%) mild improvement in the appearance of the acne scars. Conclusion: Fractional Er: YAG a safe and effective option for the treatment of acne scars in Iraqi patients by offering faster recovery time with no or mild side effects in comparison to other traditional modalities.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 09 2022
Journal Name
Research Anthology On Improving Medical Imaging Techniques For Analysis And Intervention
Groupwise Non-Rigid Image Alignment Using Few Parameters
...Show More Authors

Groupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is eff

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Face-based Gender Classification Using Deep Learning Model
...Show More Authors

Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2017
Journal Name
Asian Journal Of Biological And Life Sciences
Bioethanol Production from Banana Peels using Different Pretreatments
...Show More Authors

Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Remove Reflections using Bisquare Iterative Reweighted Least Square
...Show More Authors

Reflections are ubiquitous effects in photos taken through transparent glass mediums, and represent a big problem in photography that impacts severely the performance of computer vision algorithms. Reflection removal is widely needed in daily lives with the prevalence of camera-equipped smart phones, and it is important, but it is a hard problem. This paper addresses the problem of reflection separation from two images taken from different viewpoints in front of a transparent glass medium, and proposes algorithm that exploits the natural image prior (gradient sparsity prior), and robust regression method to remove reflections. The proposed algorithm is tested on real world images, and the quantitative and visual quality comparisons were

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Speaker Verification Using Hybrid Scheme for Arabic Speech
...Show More Authors

In this work , a hybrid scheme tor Arabic speech for the recognition

of  the speaker  verification  is presented  . The scheme is hybrid as utilizes the traditional digi tal signal processi ng and neural network . Kohonen neural  network has been used as a recognizer  tor speaker verification after extract spectral  features from an acoustic signal  by Fast Fourier Transformation Algorithm(FFT) .

The system was im plemented using a PENTIUM  processor , I000

MHZ compatible and MS-dos 6.2 .

 

View Publication Preview PDF
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Satellite Images Fusion Using Modified PCA Substitution Method
...Show More Authors

In this paper, a new tunable approach for fusion the satellite images that fall in different electromagnetic wave ranges is presented, which gives us the ability to make one of the images features little superior on the other without reducing the general resultant image fusion quality, this approach is based on the principal component analysis (PCA) fusion method. A comparison made is between the results of the proposed approach and two fusion methods (they are: the PCA fusion method and the projection of eigenvectors on the bands fusion method), and the comparison results show the validity of this new method.

View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF