This study investigated the treatment of dairy wastewater using the electrocoagulation method with iron filings as electrodes. The study dealt with real samples collected from local factory for dairy products in Baghdad. The Response Surface Methodology (RSM) was used to optimize five experimental variables at six levels for each variable, for estimating chemical oxygen demand (COD) removal efficiency. These variables were the distance between electrodes, detention time, dosage of NaCl as electrolyte, initial COD concentration, and current density. RSM was investigated the direct and complex interaction effects between parameters to estimate the optimum values. The respective optimum value was 1 cm for the distance between electrodes, (6
... Show MoreAim: To learn more about Oral Lichen Planus Iraqi patients, including their background information, symptoms, and prognosis. Materials and Methods: From the Oral and Maxillofacial Pathology Department, College of Dentistry, Baghdad University, we retrospectively reviewed the medical records of 68 patients with a histologically confirmed clinical diagnosis of oral lichen planus and subsequently contacted the patients by phone to evaluate their prognosis. Results: Females were more likely than males to experience severe pain; the reticular form of Oral Lichen Planus was the most prevalent at 38.2%, but the erosive type was more prevalent among females. Only 53 of 68 patients responded to phone calls. More than 37% of those respondents reporte
... Show MoreBackground Cold atmospheric plasma (CAP) is widely used in the cancer therapy field. This type of plasma is very close to room temperature. This paper illustrates the effects of CAP on breast cancer tissues both in vivo and in vitro. Methods The mouse mammary adenocarcinoma cell line AN3 was used for the in vivo study, and the MCF7, AMJ13, AMN3, and HBL cell lines were used for the in vitro study. A floating electrode-dielectric barrier discharge (FE-DBD) system was used. The cold plasma produced by the device was tested against breast cancer cells. Results The induced cytotoxicity percentages were 61.7%, 68% and 58.07% for the MCF7, AMN3, and AMJ13 cell lines, respectively, whereas the normal breast tissue HBL cell line exhibited very li
... Show MoreBackground: While warfarin and direct oral anticoagulants (DOACs) are used to manage thromboembolic events, they possess several features that impact adherence. Objective: To assess medication adherence and self-efficacy in patients receiving warfarin or DOAC treatment. Methods: A cross-sectional study was performed at Ibn Al-Bitar Hospital in Baghdad from December 2022 to May 2023 on patients receiving either warfarin or DOACs. The Arabic version of the Adherence to Refills and Medications Scale (ARMS) questionnaire and the Self-Efficacy for Managing Chronic Disease 6-Item Scale (SES6C) questionnaire were used to assess adherence and self-efficacy. Results: 181 patients were enrolled in the study, of whom 56.9% received warfarin an
... Show MoreObjective: An efficient solution for stabilization is the mobilization of the joints for the arthrokinematics affected by the positional defect of the CAI (i.e. chronic ankle instability). This study put to comparison the impacts of ankle dorsi flexion range of motion (DFROM) as well as dynamic balance ability (DBA) in the patients who have CAI using PJM (i.e. passive joint mobilization), a technique typically been used in previous works, and active joint mobilization (AJM), a technique which could have a greater impact on cortical excitability with the spontaneous movement. Design: rehabilitation program to treat recurrent ankle. Methods: A total of 10 players from the Iraqi clubs Muay Thai team were registered, 5 from each of
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the