ABSTRACTBackground : Acne vulgaris is a
common skin disease, affecting more than 85% of
adolescents and often continuing into adulthood.
People between 11 and 30 years of age and up to
5% of older adults. For most patients acne remains
a nuisance with occasional flares of unsightly
comedones, pustules and nodules. For other less
fortunate persons, the sever inflammatory response
to Propionibacterium acnes (P.acnes) results in
permanent
Methods: Disfiguring scars. (1, 2) Stigmata of sever
acne cane lead to social ostracism, withdrawal
from society and severe psychologic
depression (1-4).
Result Pathogenesis of acne Traditionally, acne
has been thought of as a multifactorial disease of
the folliculosebaceous unit, involving excess
sebum production, abnormal follicular
hyperkeratinization, overgrowth of
Propionibacterium acnes, and inflammation (Fig
2). Recent laboratory and clinical investigations
into the roles of the innate immune system and
extracellular matrix remodeling proteins have shed
additional light on this pathogenetic process (5-7).
Role of androgens: Activity of type 1 5areductase
enzyme was shown to predominate in
human sebaceous glands and epidermis. This
enzyme is responsible for the conversion of
testosterone to the more potent androgen,
dihydrotestosterone (DHT). DHT in turn is thought
to mediate androgen dependent skin diseases such
as acne, hirsutism and androgenetic alopecia (13)
The enzyme 5a-reductase type 1 has been studied
in those with and without acne and it has been
hypothesized that those with acne might have more
active 5a-reductase type 1 .(2)
Conclusion : The prominent role of hormones in
the pathophysiology of acne has long been
recognized and corroborated by clinical and
experimental observations and therapeutic
experience (14). Although acne is not considered a
primary endocrine disorder, androgens, such as
dihydrotestosterone, dehydroepiandrosterone
sulfate, and testosterone, and growth hormone and
insulin-like growth factors, have all been
implicated in the pathogenesis of acne (15).
Corresponding address to :
Dr. Yasir Mansour Mohamed Al-Ani
Islam Mohammad Nabil El Helou
This paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being 0.66975075, 0.470
... Show MoreNigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.
Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur
... Show MoreIn this research, the influence of the orientation and distance factors on the lowest usable frequency (LUF) parameter has been studied theoretically. The calculations of the (LUF) parameter have been made using the (VOACAP) international communication model for the connection links between the capital Baghdad and many other locations that distributed on different distances and directions over the Middle East region. The results shown in this study indicate there is a slight affection of the link direction (orientation) on the LUF parameter, while the influence of the distance factor is more significant on the values of the LUF parameter. The day/night effect appears for the long distance HF links (i.e. more than a 500 Km)