Salivary peroxidases have biological functions of particular importance to oral health. The aim of this paper is to shed the light on saliva and serum total peroxidases activity as well as the activity of each of salivary peroxidase (SPO) and myeloperoxidase (MPO) in patients with oral tumors. The studied participants were divided into two groups: the first group included 18 oral squamous cell carcinoma patients and 20 age and gender-matched healthy controls while the second group consisted of 20 oral ossifying fibroma patients and 23 age and gender-matched healthy controls. Total peroxidases activity was determined, and its specific activity was calculated in serum and whole mixed saliva as well as in the supernatant and pellet fractions
... Show MoreThe need for cloud services has been raised globally to provide a platform for healthcare providers to efficiently manage their citizens’ health records and thus provide treatment remotely. In Iraq, the healthcare records of public hospitals are increasing progressively with poor digital management. While recent works indicate cloud computing as a platform for all sectors globally, a lack of empirical evidence demands a comprehensive investigation to identify the significant factors that influence the utilization of cloud health computing. Here we provide a cost-effective, modular, and computationally efficient model of utilizing cloud computing based on the organization theory and the theory of reasoned action perspectives. A tot
... Show MoreCoupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreAbstract:
Objective: The study was done to evaluate nurses’ knowledge and practices toward physical restraint at critical care unit
Methodology: Fifty nurses, who were selected by a non-probability (convenient) sampling method, participated in this descriptive study. The instrument of the study was knowledge parts of the questionnaire were initially developed in the U.S.A for nursing homes; in 2006 they were adopted for all hospital units by the original developers. The knowledge section of the questionnaire consisted of 20 items, which were used to measure knowledge of nurses towards the definition, indications and contra
... Show More