Baylisascaris procyonis is a helminth parasite of raccoons Procyon lotor and represents a health concern in paratenic hosts, including humans and diverse domestic and wildlife species. In North America the helminth is expanding its geographic range. To better understand patterns of infection in the Ozark region of the USA, raccoons (n = 61) were collected in 2013-2014 from five counties in Missouri and Arkansas, USA and necropsied. We documented B. procyonis in all surveyed locations. The overall prevalence of B. procyonis was 44.3 % (95 % CI = 31.9 - 57.4) and was significantly higher in females than males. There were also significant differences in prevalence among raccoons sampled north and south of the Missouri River. Mean intensity was 9.9 (CI = 5.44 - 17.22), and parasites were highly aggregated among hosts such that approximately 20 % of hosts harbor 90 % of parasites. These levels of parasitism indicate that B. procyonis is common in the region and its impacts on paratenic hosts could be qualitatively similar to effects observed in other localities.
The research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of t
... Show MoreThe research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of t
... Show MoreAn experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi
Specimens of the sesarmid crab Nanonsesarma sarii (Naderloo and Türkay 2009) were collected from the intertidal zone of Khor Al-Zubair, Basrah, Iraq 2012 far from the Arabian Gulf coasts. Morphological features of this species are highlighted and a figure is provided.
Urinary tract infections (UTIs) mean microbial pathogens in the urethra or bladder (lower urinary tract). Important risk factors for recurrent UTI include obstruction of the urinary tract, use of a bladder catheter or a suppressed immune system. This study aims to isolate and identify bacteria from patients with TCC-bladder cancer or patients with a negative cystoscope and estimate antibiotic susceptibility patterns and evaluate some of the virulence factors. From a total of 62 patients with TCC-BC or negative cystoscope, only 35 favorable bacterial growths were obtained, including Escherichia coli (UPEC), a significant bacterial isolate, and Stenotrophomonas maltophilia. The percentage of multi drug-resistance bacteria
... Show MoreReverse Osmosis (RO) has already proved its worth as an efficient treatment method in chemical and environmental engineering applications. Various successful RO attempts for the rejection of organic and highly toxic pollutants from wastewater can be found in the literature over the last decade. Dimethylphenol is classified as a high-toxic organic compound found ubiquitously in wastewater. It poses a real threat to humans and the environment even at low concentration. In this paper, a model based framework was developed for the simulation and optimisation of RO process for the removal of dimethylphenol from wastewater. We incorporated our earlier developed and validated process model into the Species Conserving Genetic Algorithm (SCG
... Show MoreVariation in the numbers of pectoral fin spines and rays, pelvic fin rays, gill rakers on the first gill arch, anal fin rays, and the number of vertebrae of Silurus triostegus Heckel were examined in specimens from 16 localities that span its entire distribution range in the Tigris, Euphrates, and Shatt al-Arab rivers in Iraq. The mean number of the six meristic traits increases toward high latitudes with maximum and minimum values in the north and south of Iraq. Based on cluster analysis and PCA, the Mesopotamian river samples were clearly separated into three distinct groups. The upper Tigris populations were isolated from those of the middle and southern populations of this river and from those of
The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.