Preferred Language
Articles
/
ijl-48
In Growing Toenail Treatment using Carbon Dioxide Laser
...Show More Authors

An ingrowing toenail is a common problem affecting mainly adolescents and young adults, with a male predominance of 3:1. The disorder generally occurs in big toes. It is painful and often chronic and it affects work and social activities. Most patients initially complain of pain and later discharge, infection and difficulty in walking occur. The Objectives: The purpose of the study was to evaluate the efficacy and safety of (10600nm) CO2 laser in the treatment of ingrowing toe nail. Patients, Materials & Methods: This study was done in laser medicine research clinics from July 2013 to the end of December 2013; 10 patients including 7(70%) males and 3 (30%) females with age ranging from 18 years to 70 years with mean age of 44 years old. The details of the procedure were explained verbally to the patients. Patients were examined and evaluated clinically and prepared for surgery. A CO2 continuous wave 1-40W laser emitted at 10600 nm; the laser was delivered via an articulated arm. Laser was used for cutting the nail and vaporization of the underlying germinal layer (matrix). Results: The preliminary clinical findings included sufficient hemostasis, coagulation properties and precise incision margin with all of the surgical procedure. The postoperative advantages, i.e., lack of pain, bleeding, infection and, recurrence the good wound healing and overall satisfaction were observed in the clinical application of laser in treatment of ingrowing toenail. Conclusion: The clinical application of the CO2 (10600 nm) laser in surgical procedures prove to be of beneficial effect for daily practice. It can be considered practical, effective and easy to use, and it offers a safe, acceptable, and impressive alternative for conventional techniques of surgical treatment of in growing toenail.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Mitigation of Reflection Cracking in Asphalt Concrete Overlay on Rigid Pavements
...Show More Authors

Reflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A

... Show More
View Publication
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalizations of Fuzzy k-ideals in a KU-algebra with Semigroup
...Show More Authors
Abstract<p>We present the notion of bipolar fuzzy k-ideals with thresholds (<italic>θ, λ</italic>) of a KU-algebra with semigroup and give some basic properties of this ideal. Also, we study some relations about a bipolar fuzzy k-ideal with thresholds (<italic>θ, λ</italic>) and a k-ideal of a KU-semigroup.</p>
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage
...Show More Authors

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Role of Loop Ileostomy in the Management of Ulcerative Colitis Patients
...Show More Authors

Background: Ulcerative colitis is a chronic inflammatory condition characterized by relapsing and remitting episodes of inflammation limited to the mucosal layer of the colon.Loop ileostomy might be helpful in the management of the disease.

Objective: To evaluate the role of loop ileostomy in the management of ulcerative colitis.

 Methods: Between Januarys 2008 and January 2018, patients with fulminant ulcerative colitis resistant to medical therapy had been referred to our surgical unit and were included in our study. Assessment of the patients’ medical status (serum electrolytes, total serum protein, complete blood count, erythrocyte sedimentation rate, general stool exam,and abdominal ultrasound

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
The role of some cytokines in diabetic patients infected with toxoplasmosis
...Show More Authors

Toxoplasmosis is the term for infection and disease in man and animal caused by a parasite called Toxoplasma gondii. The more susceptible to infect with toxoplasmosis is the Diabetic patients, due to low level of immunity response. The aim of current study is to investigate the immune status of diabetes mellitus type 2. One hundred and seventy five samples of both diabetes mellitus type 2patients and controls which had been tested by ELISA technique to detect anti-Toxoplasma Abs (IgG and IgM). The positive toxoplasmosis samples were tested to detect the level of TNF alpha and MIG. Results for all samples clarified that seronegative for IgM antibodies while 53 (53%) diabetic patients were seropositive for IgG antibodies and for toxoplasmosis

... Show More
Scopus (2)
Scopus
Publication Date
Thu Nov 01 2018
Journal Name
Advances In Animal And Veterinary Sciences
Gentamicin enhances toxA expression in Pseudomonas aeruginosa isolated form cow mastitis
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Generalized closed fuzzy soft sets in Čech fuzzy soft closure spaces
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jul 28 2022
Journal Name
Mechanics Based Design Of Structures And Machines
Experimental investigation on the damping characteristics in dry and saturated sands
...Show More Authors

Scopus (3)
Crossref (4)
Scopus Clarivate Crossref