Diabetes mellitus is a global problem nowadays due to increase the disease cases all over the world, in both the developed and developing countries which may affect the quality of life (QOL ) of diabetic patients. This study was conducted to assess the quality of life of patients with type 2 diabetes mellitus (DM) and to determine some selected clinical and sociodemographic factors that affect the quality of life of these patients in Al Hila city-Iraq. This was a cross sectional study in which 100 patients with type 2 diabetes mellitus attending diabetic outpatient clinics of Merjan Teaching Hospital-Al Hila. To assess the quality of life of those diabetic patients, the World Health Organizations Quality of Life Assessment (WHOQOL) was a
... Show MoreThis study was initiated to examine the tomato-infecting viruses belonging to the Tobamovirus and Potexvirus genera in Iraq. Field observations and surveys were carried out for three successive cropping seasons (2020/21 to 2022/23) in selected tomato production areas. The purpose was to identify the main viruses associated with tomato epidemics and assess the impact of different tomato cultivars on disease occurrence. A total of 700 tomato leaf samples were collected from seven governorates (Baghdad, Diyala, Babylon, Najaf, Kerbala, Nasiriya, and Basrah) and tested using pathogen-specific immunostrip kits. The survey showed a presence of Tomato brown rugose fruit virus (ToBRFV), Tobacco mosaic virus (TMV), Pepper mild mottle virus (
... Show MoreThree scolopacids out of 150 are found infected with Haemoproteus scolopaci Galli-
Valerio 1929 and H. tringae n. sp. A detailed description of the new taxon is presented along
with a comparison of the diagnostic measurements between the two species.
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show More