Objective Neutrophils own an arsenal of dischargeable chemicals that enable them to handle bacterial challenges, manipulating innate immune response and actual participation in acquired immunity. The reactive oxygen species (ROS) are one of the most important chemicals that neutrophils discharge to eradicate pathogens. Despite their beneficial role, the ROS were strongly correlated to periodontal tissue destruction. Lowdensity neutrophils (LDN) have been recognized for producing enhanced quantities of ROS. However, the potential role of ROS produced by LDN in periodontitis is unknown. The aim of the study was to investigate the impact of ROS produced by LDN in periodontal diseases.
Maintenance of hospital buildings and its management are regarded as an important subject which needs attention because hospital buildings are service institutions which are very important to a society, requiring the search for the best procedure to develop maintenance in hospitals. The research is aimed to determine an equation to estimate the annual maintenance cost for public hospital. To achieve this aim, Al-Sader City Hospital maintenance system in Al-Najaf province has been studied with its main elements through survey of data, records and reports relating to maintenance during the years of the study 2008-2014 and to identify the strengths, weaknesses, opportunities and threat points in the current system through Swat analysi
... Show MoreBackground: Hodgkin's lymphoma (HL), formerly called Hodgkin's diseases is an uncommon form of lymphoma. The incidence of Hodgkin's lymphoma shows marked heterogeneity with respect to age, gender, race, geographic area, social class and histological subtype. This study was carried out in an attempt to evaluate the incidence of Hodgkin's lymphoma of head and neck in Baghdad city. Materials and Methods: The diagnosed cases of Hodgkin's lymphoma of head and neck region in Baghdad city between (1990-1999) were collected and analyzed according to age, gender, site and the histopathological subtypes of the tumor. Results: Out of (702) cases of Hodgkin's lymphoma of ten years between (1990-1999),(362 ) of them were occurred in the head and neck
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThere are many problems facing the economic entities as a result of its mass production &variation of its products , the matter which had increased the need & importance of cost accounting which is regarded a main tool for the managerial control.
The actual costing system is unable to meet the contemporary management needs ,so the Standard costing system appear to provide the management with required information to perform its functions by the best use& way.
This research aims to determine the standard cost for the direct material for oil extraction activity by applying it in the north oil company.
The work in this paper focuses on the experimental confirming of the losses in photonic crystal fibers (PCF) on the transmission of Q-switched Nd:YAG laser. First HC-PCF was evacuated to 0.1 mbar then the microstructure fiber (PCF) was filled with He gas & gas. Second the input power and output power of Q-switched Nd:YAG laser was measured in hollow core photonic bandgap fiber (HCPCF). In this work loss was calculated in the hollow core photonic crystal fiber (HCPCF) filled with air then N2, and He gases respectively. It has bean observed that the minimum loss obtained in case of filling (HC-PCF) with He gas and its equal to 15.070 dB/km at operating wavelength (1040-1090) nm.