Alopecia (Baldness) is very usual trouble in current time. It is accompanied by an intensive weakening of the scalp's hair and follows a specific pattern. Hereditary predisposition plays a very important role in alopecia despite not completely understood. Alopecia can be typed to various categories according to etiology, may be due to hereditary factors, autoimmune disease, and drugs or chemicals. There are many options of strategies of treatment according to the type and causes of alopecia. Chemical or synthetic medications apply for the management of hair loss are accompanied by a wide range of undesirable effects. Naturally occurring drugs also play important role in alopecia management with minimal side effects.
Pleuropulmonary blastoma is a rare and aggressive neoplasm typically presents in young children, younger than 5 years, as a pulmonary and/or pleural-based tumor. We reported a case of type-II pleuropulmonary blastoma (PPB) in an 8 month old infant who presented to Al-Khansa'a Maternity Hospital in Western Mosul with a history of repeated attacks of shortness of breath and signs of pulmonary infection unresponsive to treatment. A bronchoscopic examination showed a mass involved and obstructed the orifice of the main bronchial tree of the right upper lung lobe. A thoracotomy was performed; tumor involved the right upper lung lobe, the covering pleural surface and invading the mediastinal structures. Right
... Show MoreCyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreNowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreThis study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreLow-level microbial activity due to the production of organic acids is a recognized problem during the initial phase of food waste composting. Increasing such activity levels by adjusting the pH values during the initial composting phase is the primary objective to be investigated. In this study, sodium acetate (NaoAc) was introduced as an amendment to an in-vessel composting system. NaoAc was added when the pH of the compost mixture reached a low level (pH < 5), the addition increased pH to 5.8. This had a positive effect on the degradation of organic materials i.e. the formation of methane gas compared to the results without NaoAc addition.
The results also proved that anaerobic-aerobic in-vessel composting could reduce the
... Show MoreThe aim of this research is to study and test the impact of the policy of open-book accounting as one of the cost management mechanisms in achieving the competitive advantage in Jordanian industrial public companies, to achieve the objectives of the study, a field study was conducted by surveying the views of a sample of the accountants of the Jordanian industrial public companies. Hence the arithmetical Means, the Standard Deviations, the Significant Value and the Simple Linear Regression are used to test the research hypotheses and to achieve the research goals. The results of the study showed that there is a statistically significant effect of the policy of open-book accounting as one of the cost management mechanisms in achieving the
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreTelevision white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba
... Show More