Preferred Language
Articles
/
jkmc-218
Assessment of efficacy and safety of dapsone gel 5% in the treatment of acne vulgaris
...Show More Authors

ABSTRACTBackground : Acne vulgaris is a
common skin disease, affecting more than 85% of
adolescents and often continuing into adulthood.
People between 11 and 30 years of age and up to
5% of older adults. For most patients acne remains
a nuisance with occasional flares of unsightly
comedones, pustules and nodules. For other less
fortunate persons, the sever inflammatory response
to Propionibacterium acnes (P.acnes) results in
permanent
Methods: Disfiguring scars. (1, 2) Stigmata of sever
acne cane lead to social ostracism, withdrawal
from society and severe psychologic
depression (1-4).
Result Pathogenesis of acne Traditionally, acne
has been thought of as a multifactorial disease of
the folliculosebaceous unit, involving excess
sebum production, abnormal follicular
hyperkeratinization, overgrowth of
Propionibacterium acnes, and inflammation (Fig
2). Recent laboratory and clinical investigations
into the roles of the innate immune system and
extracellular matrix remodeling proteins have shed
additional light on this pathogenetic process (5-7).
Role of androgens: Activity of type 1 5areductase
enzyme was shown to predominate in
human sebaceous glands and epidermis. This
enzyme is responsible for the conversion of
testosterone to the more potent androgen,
dihydrotestosterone (DHT). DHT in turn is thought
to mediate androgen dependent skin diseases such
as acne, hirsutism and androgenetic alopecia (13)
The enzyme 5a-reductase type 1 has been studied
in those with and without acne and it has been
hypothesized that those with acne might have more
active 5a-reductase type 1 .(2)
Conclusion : The prominent role of hormones in
the pathophysiology of acne has long been
recognized and corroborated by clinical and
experimental observations and therapeutic
experience (14). Although acne is not considered a
primary endocrine disorder, androgens, such as
dihydrotestosterone, dehydroepiandrosterone
sulfate, and testosterone, and growth hormone and
insulin-like growth factors, have all been
implicated in the pathogenesis of acne (15).
Corresponding address to :
Dr. Yasir Mansour Mohamed Al-Ani
Islam Mohammad Nabil El Helou

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 28 2020
Journal Name
Tropical Journal Of Natural Product Research
Red Cell Distribution Width and Neutrophil-Lymphocyte Ratio as Markers for Diabetic Nephropathy
...Show More Authors

Diabetic nephropathy (DN) is the foremost cause of end-stage renal disease. Early detection of DN can spare diabetic patients of severe complications. This study aimed to evaluate the diagnostic value of red cell distribution width (RDW) and neutrophil-lymphocyte ratio (NLR) in the detection of DN in patients with type 2 diabetes mellitus (T2DM). This cross-sectional study included a total of 130 patients with T2DM, already diagnosed with T2DM. The albumin creatinine ratio (ACR) in urine samples was calculated for each patient, according to which patients were divided into two groups: with evidence of DN when ACR ? 30 mg/g, and those with no evidence of DN when ACR < 30 mg/g. According to multivariate analysis, each of disease duration (OR

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
Stereotactic and its association with cognitive performance career: صلاح نوري محمود - ظبية محمد
...Show More Authors

The importance of this study of the growing importance of perception of touch and its association with the job performance of industrial product since the perception stereotactic means he means practiced by the individual through job performance and has assets of knowledge in the mind of the user and require him to mind the capabilities and knowledge cognitive following their individual focus Zhennea.oanfalh following their enthusiasm when using Sense of touch. The study in the first chapter of the research problem to reveal the role played by the process of cognition and its relationship with the touch function of the industrial product and the associated defect in performance and harder to use. The study also pointed to the research ob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 04 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Tactical thinking and its relationship with solving mathematical problems among mathematics department students
...Show More Authors

This research aims to know the essence of the correlative relationship between tactical thinking and solving mathematical problems. The researchers followed the descriptive research method to analyze relations, as all students from the mathematics department in the morning study were part of the research group. The research sample of (100) male and female students has been chosen based on the arbitrators' views. The tools for studying the sample of research composed of (12) items of the multiple-choice test in its final form to measure tactical thinking and require establish-ing a test of (6) test-type paragraphs to solve mathematical problems. The findings showed that sample students' tactical thinking and their capacity to overcome mathem

... Show More
View Publication
Scopus (51)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Aug 08 2021
Journal Name
Proceedings Of International Conference On Emerging Technologies And Intelligent Systems
Drone Altitude Control Using Proportional Integral Derivative Technique and Recycled Carbon Fiber Structure
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Nov 01 2025
Journal Name
Journal Of Molecular Liquids
Chitosan salt as a dual-function agent for CO₂ sequestration and acidizing enhancement
...Show More Authors

The utilization of carbon dioxide (CO₂) to enhance wellbore injectivity presents a cost-effective and sustainable strategy for mitigating greenhouse gas emissions while improving reservoir performance. This study introduces an environmentally friendly method employing a water-soluble chitosan salt (CS) that generates a carbonated-rich acid solution upon contact with dry CO₂ at 25 °C and 508 psi. CS solutions (100–2000 ppm) were prepared and evaluated for CO₂ uptake, acid generation, and rheological behavior. Results show that 1000 ppm achieves an optimal CO2 uptake (2612 mg/l), with moderate viscosity increase (from 1.52 to 3.37 cp), while higher concentrations exhibit a sharp rise due to polymer-like network formation. Core floodi

... Show More
View Publication
Crossref