ABSTRACTBackground : Acne vulgaris is a
common skin disease, affecting more than 85% of
adolescents and often continuing into adulthood.
People between 11 and 30 years of age and up to
5% of older adults. For most patients acne remains
a nuisance with occasional flares of unsightly
comedones, pustules and nodules. For other less
fortunate persons, the sever inflammatory response
to Propionibacterium acnes (P.acnes) results in
permanent
Methods: Disfiguring scars. (1, 2) Stigmata of sever
acne cane lead to social ostracism, withdrawal
from society and severe psychologic
depression (1-4).
Result Pathogenesis of acne Traditionally, acne
has been thought of as a multifactorial disease of
the folliculosebaceous unit, involving excess
sebum production, abnormal follicular
hyperkeratinization, overgrowth of
Propionibacterium acnes, and inflammation (Fig
2). Recent laboratory and clinical investigations
into the roles of the innate immune system and
extracellular matrix remodeling proteins have shed
additional light on this pathogenetic process (5-7).
Role of androgens: Activity of type 1 5areductase
enzyme was shown to predominate in
human sebaceous glands and epidermis. This
enzyme is responsible for the conversion of
testosterone to the more potent androgen,
dihydrotestosterone (DHT). DHT in turn is thought
to mediate androgen dependent skin diseases such
as acne, hirsutism and androgenetic alopecia (13)
The enzyme 5a-reductase type 1 has been studied
in those with and without acne and it has been
hypothesized that those with acne might have more
active 5a-reductase type 1 .(2)
Conclusion : The prominent role of hormones in
the pathophysiology of acne has long been
recognized and corroborated by clinical and
experimental observations and therapeutic
experience (14). Although acne is not considered a
primary endocrine disorder, androgens, such as
dihydrotestosterone, dehydroepiandrosterone
sulfate, and testosterone, and growth hormone and
insulin-like growth factors, have all been
implicated in the pathogenesis of acne (15).
Corresponding address to :
Dr. Yasir Mansour Mohamed Al-Ani
Islam Mohammad Nabil El Helou
The study aims to identify the level of existential frustration and the level of recrimination among the students of universities, identify the statistical differences between the existential frustration and recrimination based on gender, and finally, identify the correlation between the existential frustration and recrimination. To do this, the researcher adopted the existential frustration scale of ( al-saaedi, 2009) that consisted of (43) item, he also adopted the recrimination scale of ( al-zugeibi,2008) which composed of (31) item. The total sample was (120) male and female student were chosen randomly from four colleges within the university of Baghdad for the academic year ( 2015-2016). The results revealed that the targeted sampl
... Show MoreGeneral Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k
... Show MoreBased on a finite element analysis using Matlab coding, eigenvalue problem has been formulated and solved for the buckling analysis of non-prismatic columns. Different numbers of elements per column length have been used to assess the rate of convergence for the model. Then the proposed model has been used to determine the critical buckling load factor () for the idealized supported columns based on the comparison of their buckling loads with the corresponding hinge supported columns . Finally in this study the critical buckling factor () under end force (P) increases by about 3.71% with the tapered ratio increment of 10% for different end supported columns and the relationship between normalized critical load and slenderness ratio was g
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreBackground. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between differe
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe present work is to investigate the feasibility of removal vanadium (V) and nickel (Ni) from Iraqi heavy gas oil using activated bentonite. Different operating parameters such as the degree of bentonite activation, activated bentonite loading, and operating time was investigated on the effect of heavy metal removal efficiency. Experimental results of adsorption test show that Langmuir isotherm predicts well the experimental data and the maximum bentonite uptake of vanadium was 30 mg/g. The bentonite activated with 50 wt% H2SO4 shows a (75%) removal for both Ni and V. Results indicated that within approximately 5 hrs, the vanadium removal efficiencies were 33, 45, and 60% at vanadium loadings of 1
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi
... Show More