Background: Chronic obstructive pulmonary disease (COPD) is a progressive airflow limitation that is preventable but not curable. It is associated with persistent symptoms that cause a considerable burden on individual productivity at work, and daily activities, and reduced quality of life, also burdening the healthcare system and society. Objectives: The study aims to measure the burden of COPD on patients in terms of daily activities and work productivity. It also seeks to investigate some inflammatory biomarkers' levels and their correlation with selected outcomes. Patients and Methods: A cross-sectional study on 120 stable COPD patients who were diagnosed and treated according to the GOLD guidelines at Kirkuk General Hospital's
... Show MoreDairy wastewater generally contains fats, lactose, whey proteins, and nutrients. Casein precipitation causes the effluent to decompose into a dark, strong-smelling sludge. Fluid waste contains soluble organic matter, suspended solids, and gaseous organic matter, which cause undesirable taste and smell, grant tone and turbidity, and advance eutrophication, which plays an essential role in increasing biological oxygen demand (BOD) in water. It also contains detergents and disinfecting agents from the rinses and washing processes, which increase the need for chemical oxygen (COD). One of the characteristics of dairy effluents is their relatively high temperature, high organic contents, and wide pH range, so the discharge of wastewater into
... Show MoreThis study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreHighway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav
... Show MoreBackground: Recurrent aphthous stomatitis (RAS) is one of the most common oral mucosal disorders with a prevalence of 50-66%. The prevalence of hematinic deficiencies including ferritin and vitamin B12 deficiencies and their role in the prophylaxis and development of RAS is not well known. Many studies have demonstrated a high prevalence of hematinic deficiencies in patients with RAS. This study aimed to compare the serum level of ferritin and vitamin B12 in patients with recurrent aphthous ulcers and healthy controls. Subjects, Materials and Methods: The data were collected from patients who needed blood analysis to exclude anemia from November 2020 to May 2021. The study was approved by the institutional ethics committee. After recordi
... Show MoreThis study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t