Background: Brush cytology is an accepted technique that gets renewed interest. It is now used as an aid for the diagnosis and observation of possible epithelial changes that could be associated with oral mucosal diseases. This study aimed to evaluate the cytomorphometric changes in gingiva and buccal mucosa of type II diabetics and to assess their relation to oral symptoms and glycemic status. Materials and methods: Cytological Papanicolaou stained smear were prepared from cheek and gingiva of 20 non treated cases, 20 treated diabetics and 20 healthy persons of both sex after measuring their HbA1c and recording their oral symptoms. Hundred unfolded epithelial cells were evaluated qualitatively using MCID software to measure nuclear and cy
... Show MoreObjective: The study aims to evaluate nurses' knowledge toward care of unconscious adult patients and identify the relationship between nurses’ knowledge toward care of unconscious adult patient and their demographic characteristics of age, gender, Marital Status, level of qualification and years of experience. Methodology: A descriptive study (quantitative design) was carried out by using quasi experimental design to study nurses' knowledge, attitudes and practices toward care of unconscious adult patients at teaching hospitals in Al-Hilla City from September 2018 up to June 2019. A purposively sample has been chosen in which included 60 nurses who work in ICUs within two hospitals (Imam Al-Sadiq teaching hospital and Al-Hilla general
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreCoronary heart disease (CHD) is the leading cause of death in United State (U.S.). Controlling of modifiable risk factors such as smoking, hypertension (HT), diabetes mellitus (D.M.), dyslipidemia, physical inactivity & obesity will prevent other serious cardiovascular complications
Acute decompensated heart failure (ADHF) is a leading cause of hospital admission and many factors are known to precipitate decompensation. We aimed to assess the decompensating factors of heart failure and the management of patients admitted to the emergency department (ED). A total of 107 patients were examined, all diagnosed with ADHF in the ED of the Baghdad Teaching Hospital, from June 2017 to December 2017, and presenting with decom¬pensation (pulmonary oedema, peripheral oedema, and fatigue). The mean patient age was 62.5 ± 9.8 years (range: 43–85 years); the majority of them were in their 7th decade (37.4%), and men were slightly more than women. Hy¬pertension was the most commonly associated comorbidity (68.2%), follow
... Show More(The sign) was born with the birth of man, after the primitive man revealed through it the forms of speech, to express his needs and instincts, and he expressed his insides through them, through the effect of his interaction and conflict with his human counterpart on the one hand and nature on the other hand, for the purpose of communicating and communicating information, as a primitive language Indicative ...., until the linguistic language replaced it and thus signs took a further development, represented by other means that were embodied by gestures, signs and movements that took common social formulas .. such as the dances that a person practiced in his social rituals and the objective and transitional movements they contained And ge
... Show MoreFace recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show More