Background Molluscum contagiosum is skin disease caused by the molluscum contagiosum virus (MCV) usually causing one or more small dome shaped umbilicated papules with symptoms that maybe self-resolve. MCV was once a disease primarily of children, but it has evolved to become a sexually transmitted disease in adults. It is believed to be a member of the pox virus family. In addition to the classic presentation of the disease; it can also come in different clinical forms that simulate large number of dermatolological disease.
Objective: To study different clinical forms of Molluscum contagiosum presentation in different age groups of Iraqi patients.
Method:This clinical descriptive study was performed in the outpatient department of Dermatology and Venereology : Al–Kindy Teaching Hospital in Baghdad from August 2010 - October 2011A total of three hundred and thirty Patients (180 female sand150 males) recruited in this study diagnosed as Molluscum contagiosum on different sites ; both classical and non classical presentation were studied.
Results: Twenty eight patients (8.48%) out of the 330 patients (14 male and 12 female) showed atypical clinical presentation, while 302 (91.52%) patients showed typical presentation.
Conclusion:Molluscum contagiosum can presented with either classic or non classic presentation mulating many dermatological disease.
Manipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show MoreNonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.
We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas
In this research local wheat peel was used as an adsorbent surface for removal of Azure B (AB) dye from the aqueous solution. The adsorption process was performed at different experimental parameters, equilibrium time, temperature, ionic strength and solution pH. The isotherms of adsorption are of H-type as compared with Giles curves and the adsorption data were coincide with Freundlich equation. The adsorption kinetic data were analyzed using pseudo- first and second order kinetic models. The effect of temperature was studied and the amount of dye adsorbed was found to increase with the increasing of temperature from 25 to 50 oC. The values of thermodynamic functions like enthalpy and entropy have been estimated. The quantity of adso
... Show MoreThis paper aims to build a modern vision for Islamic banks to ensure sustainability and growth, as well it aims to highlight the positive Iraqi steps in the Islamic banking sector. In order to build this vision, several scientific research approaches were adopted (quantitative, descriptive analytical, descriptive). As for the research community, it was for all the Iraqi private commercial banks, including Islamic banks. The research samples varied according to a diversity of the methods and the data availability. A questionnaire was constructed and conducted, measuring internal and external honesty. 50 questionnaires were distributed to Iraqi academic specialized in Islamic banking. All distributed forms were subject to a thorough analys
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More
In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3 in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled in the bottom of TESB of vertical SC. The TESB was
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreOlive leaves extract is famous for its antioxidant and protective effects. In this study, the aqueous extract of Iraqi Olea europaea L. Leaves was investigated for its anti-diabetic effects against low double doses of alloxan induced Diabetes Mellitus in rats. Low double doses (75 mgKg body weight) of alloxan were injected intraperitoneally at day 1&29 of the experimental period in rats, whereas an aqueous extract of Iraqi Olea europaea L. Leaves was added continuously to their drinking water. Serum malondialdehyde concentration, total oxidative stress and oxidative stress index as oxidoreductive stress biomarker, activities of certain anti-oxidoreductive stress enzymes (glutathione peroxidase, super oxide dismutase and catalase) and concen
... Show MoreOlive leaves extract is famous for its antioxidant and protective effects. In this study, the aqueous extract of Iraqi Olea europaea L. Leaves was investigated for its anti-diabetic effects against low double doses of alloxan induced Diabetes Mellitus in rats. Low double doses (75 mg\Kg body weight) of alloxan were injected intraperitoneally at day 1&29 of the experimental period in rats, whereas an aqueous extract of Iraqi Olea europaea L. Leaves was added continuously to their drinking water. Serum malondialdehyde concentration, total oxidative stress and oxidative stress index as oxidoreductive stress biomarker, activities of certain antioxidoreductive stress enzymes (glutathione peroxidase, super oxide dismutase and catalase) and concen
... Show More