Background: Swine influenza (also Called pig influenza, swine flu, hog flu and pig flu) is an infection by any one of several types of swine influenza virus (SIV) or S-OIV (Swine-Origin influenza virus) is any strain of the influenza family of viruses that is endemic in pigs. Patients and Methods:- Ninety patients with there families suspected of swine flu who were admitted to Central Teaching Hospital of Pediatric in Baghdad seventy one from Baghdad Al-Kerkh, twelve from Baghdad Al-Rasafa and seven other Iraqi Governorate (1 in Suleimaniya, 2 in Baquba, 4 in Anbar) they were included in a prospective study started from the 1st October till the 30 th of November 2009. Results:- The study revealed from )90( suspected cases the H1N1 Virus Positive represents (54) cases (60.0 %). Conclusions:- Confirmed cases of swine flu (H1N1) virus positive represent 54 cases (60%) diagnosed by PCR. Key Word:- H1N1Virus, Iraqi.
This paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreManipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show MoreThe study titled “The role of the social media sites of Iraqi satellite channels in prioritizing the public” is a field study for the public of Dhi Qar.
The emergence of the social networking sites we are currently experiencing has undergone radical and important changes in the role of the mass media in light of the growth and rapid spread of modern technologies Or the so-called new media، which led the media organizations to create satellite channels on the social networks، which led to bypass the traditional lines between the public and media institutions with the public gain the possibility of The purpose of the research is to determine the habits and patterns of public use of the social media sites of the Iraqi satellite cha
Modern communication and media technology has pioneered new horizons and curried out deep changes in the various fields of social life, It effected enormously human communication as well.
Content one Who late the developments which have effected the social relations ،due to the new media ،especially Face book ,will certainly notice the far cry changes of the social relation net which has been effected ,in a way or another ،the accelerated development ،under the appearance of the so called the virtual society .
Face book has embodied the means – communication ,which has become an important turn point in the social communication .
It is the point the present paper tries to expose an discuss by a field study curried on a sam
Incremental sheet forming (ISF) process offers a high degree of flexibility in the manufacturing of different sheet parts, which makes it an ideal candidate for prototype parts as well as efficient at fabricating various customized products at low production costs compared to traditionally used processes. However, parts produced in this process exhibit notable geometrical inaccuracy and considerable thickness reduction. In this paper, the single point incremental sheet forming variant of the process has been implemented to manufacture a highly customized cranial implant starting from the computed tomography (CT) scan data of the patient's anatomy. A methodology, from the modeling to the realization of the implant, is presented and discus
... Show MoreThis research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreThis study was carried out to evaluate the antioxidant activity of Iraqi sumac seeds (Rhus coriaria. L) (Anacardiaceae). Total phenolic compounds and flavoniods were determined in three different sumac seed extracts (SSE) (aqueous,ethanolic and methanolic extract). For extraction Antioxidant activity of SSE were evaluated by various antioxidant assays, including total antioxidant capacity, reducing power,by using 1,1-diphenyl-2-picryl hydrazyl (DPPH) radical scavenging, nitric oxide scavenging, Hydroxyl radical scavenging, and metal ion chelating activities. These various antioxidant activities were compared with ascorbic acid as a standard antioxidant.The results showed that the three(SSE), contained large amounts of phenolic and flavonio
... Show Moreأن السياسة النقدية في العراق لم تشهد تحسناً كبيراً في دورها المطلوب
منها، وهذا يعود الى جملة من التغيرات على أدائها ودورها في التأثير على المتغيرات الأقتصادية المهمة، اذ حصلت ظروف صعبة على المستوى السياسي والأقتصادي اسهمت في أضعاف دورها في العراق. فالحروب العسكرية الثلاثة في وقت قياسي دمرت البنى التحتية للأقتصاد العراقي، وأخرت عملية التنمية الأقتصادية والبشرية لعدة عقود بسبب الأستنزاف الكبير للمو
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the