Preferred Language
Articles
/
ijl-48
In Growing Toenail Treatment using Carbon Dioxide Laser
...Show More Authors

An ingrowing toenail is a common problem affecting mainly adolescents and young adults, with a male predominance of 3:1. The disorder generally occurs in big toes. It is painful and often chronic and it affects work and social activities. Most patients initially complain of pain and later discharge, infection and difficulty in walking occur. The Objectives: The purpose of the study was to evaluate the efficacy and safety of (10600nm) CO2 laser in the treatment of ingrowing toe nail. Patients, Materials & Methods: This study was done in laser medicine research clinics from July 2013 to the end of December 2013; 10 patients including 7(70%) males and 3 (30%) females with age ranging from 18 years to 70 years with mean age of 44 years old. The details of the procedure were explained verbally to the patients. Patients were examined and evaluated clinically and prepared for surgery. A CO2 continuous wave 1-40W laser emitted at 10600 nm; the laser was delivered via an articulated arm. Laser was used for cutting the nail and vaporization of the underlying germinal layer (matrix). Results: The preliminary clinical findings included sufficient hemostasis, coagulation properties and precise incision margin with all of the surgical procedure. The postoperative advantages, i.e., lack of pain, bleeding, infection and, recurrence the good wound healing and overall satisfaction were observed in the clinical application of laser in treatment of ingrowing toenail. Conclusion: The clinical application of the CO2 (10600 nm) laser in surgical procedures prove to be of beneficial effect for daily practice. It can be considered practical, effective and easy to use, and it offers a safe, acceptable, and impressive alternative for conventional techniques of surgical treatment of in growing toenail.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Egyptian Journal Of Chemistry
Treatment of petroleum refinery wastewater by electro-Fenton process using porous graphite electrodes
...Show More Authors

View Publication
Scopus (31)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Spatial Distribution of Heavy Element in Erbil's Municipal Landfills by Using GIS
...Show More Authors

Untreated municipal solid waste (MSW) release onto land is prevalent in developing countries. To reduce the high levels of harmful components in polluted soils, a proper evaluation of heavy metal concentrations in Erbil's Kani Qrzhala dump between August 2021 and February 2022 is required. The purpose of this research was to examine the impact of improper solid waste disposal on soil properties within a landfill by assessing the risks of contamination for eight heavy elements in two separate layers of the soil by using geoaccumulation index (I-geo) and pollution load index (PLI) supported. The ArcGIS software was employed to map the spatial distribution of heavy element pollution and potential ecological risks. The I-geo values in summe

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Physics Letters A
Wake potential of swift ion in amorphous carbon target
...Show More Authors

The wake potential and wake phenomena for swift proton in an amorphous carbon target were studied by utilising various dielectric function formalisms, including the Drude dielectric function, the Drude–Lorentz dielectric function and quantum dielectric function. The Drude model results exhibited a damped oscillatory behaviour in the longitudinal direction behind the projectile; the pattern of these oscillations decreases exponentially in the transverse direction. In addition, the wake potential extends slightly ahead of the projectile which also depends on the proton coordinate and velocity. The effect of electron binding on the wake potential, characterised by the ratio to 0.1, has been studied alongside the Drude–Lorentz dielectric

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating the Efficiency of the Municipal Sector in Anbar Governorate, using the Non-Parametric Approach (DEA).
...Show More Authors

 

The research aims to measure, assess and evaluate the efficiency of the directorates of Anbar Municipalities by using the Data Envelopment Analysis method (DEA). This is because the municipality sector is consider an important sector and has a direct contact with the citizen’s life. Provides essential services to citizens. The researcher used a case study method, and the sources of information collection based on data were monthly reports, the research population is represented by the Directorate of Anbar Municipalities, and the research sample consists of 7 municipalities which are different in terms of category and size of different types. The most important conclusion reached by the research i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Estimating the general exponential distribution parameters using the simulation method
...Show More Authors

The main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular, 

. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation  by using monte carlo simulation technique .. It was obse

... Show More
View Publication Preview PDF
Crossref