Background Molluscum contagiosum is skin disease caused by the molluscum contagiosum virus (MCV) usually causing one or more small dome shaped umbilicated papules with symptoms that maybe self-resolve. MCV was once a disease primarily of children, but it has evolved to become a sexually transmitted disease in adults. It is believed to be a member of the pox virus family. In addition to the classic presentation of the disease; it can also come in different clinical forms that simulate large number of dermatolological disease.
Objective: To study different clinical forms of Molluscum contagiosum presentation in different age groups of Iraqi patients.
Method:This clinical descriptive study was performed in the outpatient department of Dermatology and Venereology : Al–Kindy Teaching Hospital in Baghdad from August 2010 - October 2011A total of three hundred and thirty Patients (180 female sand150 males) recruited in this study diagnosed as Molluscum contagiosum on different sites ; both classical and non classical presentation were studied.
Results: Twenty eight patients (8.48%) out of the 330 patients (14 male and 12 female) showed atypical clinical presentation, while 302 (91.52%) patients showed typical presentation.
Conclusion:Molluscum contagiosum can presented with either classic or non classic presentation mulating many dermatological disease.
Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreA cumulative review with a systematic approach aimed to provide a comparison of studies’ investigating the possible impact of the active form of vitamin D3, calcitriol (CTL), on the tooth movement caused by orthodontic forces (OTM) by evaluating the quality of evidence, based on collating current data from animal model studies, in vivo cell culture studies, and human clinical trials. Methods: A strict systematic review protocol was applied following the application of the International Prospective Register of Systematic Reviews (PROSPERO). A structured search strategy, including main keywords, was defined during detailed search with the application of electronic database systems: Medline/Pubmed, EMBASE, Scopus, Web of Science, and
... Show MoreThis study examines experimentally the performance of a horizontal triple concentric tube heat exchanger TCTHE made of copper metal using water as cooling fluid and oil-40 as hot fluid. Hot fluid enters the inner annular tube of the TCTHE in a direction at a temperature of 50, 60 and 70 oC and a flow rate of 20 l/hr. On the other hand, the cooling fluid enters the inner tube and the outer annular tube in the reverse direction (counter current flow) at a temperature of 25 oC and flow rates of 10, 15, 20, 25, 30 and 35 l/hr. The TCTHE is composed of three copper tubes with outer diameters of 34.925 mm, 22.25 mm, and 9.525 mm, and thicknesses of 1.27 mm, 1.143 mm, and 0.762 mm, respectively. TCTHE tube's length was 670
... Show MoreThe main object of this article is to study and introduce a subclass of meromorphic univalent functions with fixed second positive defined by q-differed operator. Coefficient bounds, distortion and Growth theorems, and various are the obtained results.
Braces in straight bridge systems improve the lateral-torsional buckling resistance of the girders by reducing the unbraced length, while in horizontally curved and skew bridges, the braces are primary structural elements for controlling deformations by engaging adjacent girders to act as a system to resist the potentially large forces and torques caused by the curved or skewed geometry of the bridge. The cross-frames are usually designed as torsional braces, which increase the overall strength and stiffness of the individual girders by creating a girder system that translates and rotates as a unit along the bracing lines. However, when they transmit the truck’s live load forces, they can produce fatigue cracks at their connection
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe search included a comparison between two etchands for etch CR-39 nuclear track detector, by the calculation of bulk etch rate (Vb) which is one of the track etching parameters, by two measuring methods (thichness and change mass). The first type, is the solution prepared from solving NaOH in Ethanol (NaOH/Ethanol) by varied normalities under temperature(55˚C)and etching time (30 min) then comparated with the second type the solution prepared from solving NaOH in water (NaOH/Water) by varied normalities with (70˚C) and etching time (60 min) . All detectors were irradiated with (5.48 Mev) α-Particles from an 241Am source in during (10 min). The results that Vb would increase with the increase of
... Show MoreIntroduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show More