Background: Palmoplantar psoriasis is a therapeutically challenging condition that can significantly impact patient quality of life as it directly affects activities. However, despite this impact, few clinical studies address treatment. Herbs and their extracts have been used for treatment of skin disease for centuries. One of the most popular herbs in our society is black cumin or seed of blessing oil (Nigella Sativa); this plant had diverse clinically useful activity.
Patients and Methods: This study was conducted in the Department of Dermatology and Venereology in Baghdad Teaching Hospital, Iraq during the period between January and October 2003. In this singleblind randomly controlled therapeutic study, thirty patients were enrolled, their ages ranged from 22-65 years. There were 18` females and 12 males. The patients were divided into 2 groups; group A (20 patient) instructed to use nigella sativa 10% ointment twice daily for 3 months, while group B (10 patient) used a control ointment(Vaseline) . Statistical analyses were carried out by computer using ttest, and chi-square when needed.
Results: twenty-four patients completed the study. In group A (18 patients), we noted a significantly reduction of the thickness and fissuring of the skin of the affected part which was also become very soft after 3 months of therapy. The response of patients to treatment was good in 50%, moderate in 27.8% and mild response in 22.2%. The satisfaction of patients with treatment was full in 61.1%, partial in 27.8%, and no satisfaction in 11.1%. In group B (6 patients), the lesions showed no significant reduction after 3 months and the response of patients to treatment was good in 16.6%, moderate in 33.4%, and mild response in 50%. The satisfaction of patients with treatment in this group was full in 16.6%, partial in 50%, and no satisfaction in 33.4%. The difference in outcome after 12 weeks between the 2 study groups was statistically significant.
Conclusion: The ointment of the black cumin is considered as a very good remedy for the palmoplantar psoriasis. This remedy is considered to be very safe, cheap and easy to prepare with no serious side effects as compared to the previous ointments for this type of psoriasis.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreA study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.
In this paper, we propose a new approach of regularization for the left censored data (Tobit). Specifically, we propose a new Bayesian group Bridge for left-censored regression ( BGBRLC). We developed a new Bayesian hierarchical model and we suggest a new Gibbs sampler for posterior sampling. The results show that the new approach performs very well compared to some existing approaches.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBackground: The purpose of the current study was to evaluate the efficacy of a new orthodontic bonding system (Beauty Ortho Bond) involving the shear bond strength in dry and wet environments, and adhesion remnant index (ARI) scores evaluation in regard to other bonding systems (Heliosit and Resilience Orthodontic Adhesives). Materials and methods: Sixty defect free extracted premolars were randomly divided into six groups of 10 teeth each, mounted in acrylic resin, three groups for a dry environment and three for a wet one. Shear bond strength test was performed with a cross head speed of 0.5 mm/min, while surfaces of enamel and bracket-adhesive-enamel surfaces were examined with stereomicroscope For ARI scores evaluation. Data were analyz
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the