Background: In Iraqi communities, the workers considered the largest population groups, so increasing their dental education by increasing the care for their dental health knowledge and behavior is very important, the present study was aimed to evaluate the gingival health and oral hygiene in relation to knowledge and behavior among a group of a workers selected randomly from Al Fedaa company in Baghdad city. Materials and methods: A sample of 110 workers (65 men and 45 women) included in this study, a questionnaire used to evaluate their oral health knowledge and behavior. The gingival health condition of the workers was examined by using Loe and Silness index (1963), Silness and Loe index (1964) was used to asses plaque quantity, and Ramf
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreBreast cancer is one of the most widespread cancers,depending on World Health Organization, cancer calculated for approximately 7.6 million incidences in 2008, whoever expected elevation in incidence is about 13.1 million in 2030. So that the current research investigates vitamin D role in the occurrence of this disease and explains if vitamin D has a positive effect on the incidence of disease, as well as measuring parathyroid hormone and estrogen levels. Three groups were included in this analysis: control healthy women, benign and malignant breast tumor women. All cases that were selected at the beginning of the disease diagnosis. According to statistical values vitamin D showed highly significant (P<0.001) decrease in benign (3.74±2.33
... Show MoreHigh-performance liquid chromatographic methods are used for the determination of water-soluble vitamins with UV-Vis. Detector. A reversed-phase high-performance liquid chromatographic has been developed for determination of water-soluble vitamins. Identification of compounds was achieved by comparing their retention times and UV spectra with those of standards solution. Separation was performed on a C18 column, using an isocratic 30% (v/v) acetonitril in dionozed water as mobile phase at pH 3.5 and flow rate 1.0m/min. The method provides low detection and quantification limits, good linearity in a large concentration interval and good precision. The detection limits ranged from 0.01 to 0.025µg/ml. The accuracy of the method was
... Show MoreThe azo ligand obtained from the diazotization reaction of 2-aminobenzothiazole and 4- nitroaniline yielded a novel series of complexes with Co(II), Ni(II), Cu(II), and Zn(II) ions. The complexes were investigated using spectral techniques such as UV-Vis, FT-IR, 1H and 13C NMR spectroscopic analyses, LC-MS and atomic absorption spectrometry, electrical conductivity, and magnetic susceptibility. The molar ratio of the synthesized compounds was determined using the ligand exchange ratio, which revealed the metal-ligand ratios in the isolated complexes were 1:2. The synthesized complexes were tested for antimicrobial activity against S. aureus, E. coli, C. albicans, and C. tropicalis bacterial species. Additionally, their binding affinities we
... Show MoreMany athletes believe that it enhances the level of performance during training and competition, in addition to compensating for fluids during exercise when the levels of temperature and humidity in the atmosphere rise during the athlete's intensive training, as it increases the requirements for fluid compensation to avoid the risk of potential thermal disorders. If training continues for more than an hour causing fatigue, athletes are advised to drink carbohydrate drinks that quickly convert to glucose in the blood, while sodium should be included in the fluids consumed during exercise or matches that last more than (1-2 hours). The effect of drinking a drink containing 12% carbohydrates and electrolytes before each half of a simul
... Show More