Background The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreBackground: Periodontal disease is a chronic bacterial infection that affects the gingiva and bone supporting the teeth. Smoking, which is an important risk factor for periodontitis, induce oxidative stress in the body and cause an imbalance between reactive oxygen species (ROS) and antioxidants, such as superoxide dismutase (SOD). This study aimed to evaluate the influence of smoking on periodontal health status by estimating the levels of salivary SOD level in non-smokers (controls) and light and heavy smokers and to test the correlation between the SOD enzyme level and the clinical periodontal parameters in each group. Materials and Methods: The study sample consisted of 75 male, with age ranged from 35 to 50 years. Clinically, the perio
... Show MoreA new derivatives of Schiff bases connected with 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c were prepared via many reactions starting by treating 1,4-phenylene diamine 1 with chloroacetylchloride to prepared compound 2, then reaction with p-hydroxybenzaldehyde to synthesize compound 3 then, this was reacted with thioglycolic acid and thiosemicarazide to giveN,N-(1.4-phenylene)bis(2-(4-(2-amino-5Hthiazolo[4,3-b][1,3,4]thiadiazol-5-yl)phenoxy)acetamide) 4. Compound 4 was treated with different aromatic aldehydes to give a new derivatives of Schiff bases containing 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c. The synthesized compounds were characterized using FTIR spectrophotometer and 1H NMR spectroscopy and the biological activity of
... Show MoreThe study discussed here deals with the isolation of Aspergillus niger from palm dates, the formal and the most famous fruit in Iraq, to test and qualify this fungus isolate for its ability to produce citric acid. Submerged fermentation technique was used in the fermentation process. A.niger isolated from “Zahdi” Palme dates was used in the study of the fermentation kinetics to get the production efficiency of citric acid. Kinetics of CA production via fermentation by A. niger S11 was evaluated within 432 h fermentation time and under submerged conditions of 11% (w/v) sucrose, 5% (v/v) inoculum size, pH 4, 30 °C and 150 rpm. The maximum citric acid produced was (37.116 g/l). Kine
In this study, several ionanofluids (INFs) were prepared in order to study their efficiency as a cooling medium at 25 °C. The two-step technique is used to prepare ionanofluid (INF) by dispersing multi-walled carbon nanotubes (MWCNTs) in two concentrations 0.5 and 1 wt% in ionic liquid (IL). Two types of ionic liquids (ILs) were used: hydrophilic represented by 1-ethyl-3-methylimidazolium tetrafluoroborate [EMIM][BF4] and hydrophobic represented by 1-hexyl-3-methylimidazolium hexafluorophosphate [HMIM][PF6]. The thermophysical properties of the prepared INFs including thermal conductivity (TC), density and viscosity were measured experimental
Background: Salivary tumors are uncommon, being of low incidence worldwide. This study aimed to assess cases collected in this series of salivary gland tumors in regard to histopathological typing, in relation to age, site and gender. Materials and methods: This is a retrospective study; cases were collected from public and private laboratories. A total number of 171 cases were collected. The slides were reviewed and reclassified for histopathological typing according to WHO classification 2005. Results: Benign tumors were more common than malignant tumors. The most common histological type was benign mixed tumor, followed by Warthin’s tumor. The most common malignant tumor was adenoid cystic carcinoma. One hundred twenty three cases ou
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More