Rationale, aims and objectives: A review of studies published over the last six years gives update about this hot topic. In the middle of COVID-19 pandemic, this study findings can help understand how population may perceive vaccinations. The objectives of this study were to review the literature covering the perceptions about influenza vaccines and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM). Methods: A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions, and Middle East. Empirical studies that dealt with people/ HCW perceptions of influenza vaccine in the Middle East and written in English were included. The search covered articles published between January 2015 and November 2020. Results: A total of 34 cross-sectional studies from of 22 countries were included in this review. The vaccination rates in Middle East varied widely. However, the overall influenza vaccination rates were generally low (<50%) among general population, particularly among pregnant women and children. HCWs had relatively higher vaccination rates compared to general population. Old age, health comorbidities or working in high-risk environments were noted as major motivators to receive the vaccine. Concerns about adverse reactions and the lack of vaccine efficacy were the most predominant reported barriers to receiving the vaccines. Lastly, cues to actions included receiving advice from HCWs, influence of institutional requirement, awareness/ educational pamphlets and influence from the media. Conclusions: The HBM can be helpful in identifying and analyzing motivators and barriers to vaccination. Additionally, by looking at the root causation, this model can help plan campaigns to increase vaccination rates in the region. Finally, we recommend empowering HCWs to proactively advocate for vaccination as part of preventive care.
Background: The protective roles of vitamin C and total proteins in gingival inflammation were reported by several studies. The aim of this study was to measure the concentration of salivary vitamin C, total protein and their relation to gingival health among dental students. Materials and methods: The sample consisted of 67 dental students (33 males and 34 females) from College of Dentistry, University of Baghdad. Sillness and Löe (1964) was used for recording of dental plaque, while the gingival index (GI) was measured according to Löe and Sillness criteria (1963). Stimulated salivary samples were collected and chemically analyzed in Poisoning Center/Surgical Specialty Hospital by using colorimetric method to measure the salivary v
... Show MoreThis study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra
This research adopts the estimation of mass transfer coefficient in batch packed bed distillation column as function of physical properties, liquid to vapour molar rates ratio (L / V), relative volatility (α), ratio of vapour and liquid diffusivities (DV / DL), ratio of vapour and liquid densities (ρV / ρL), ratio of vapour and liquid viscosities (μV/ μL).
The experiments are done using binary systems, (Ethanol Water), (Methanol Water), (Methanol Ethanol), (Benzene Hexane), (Benzene Toluene). Statistical program (multiple regression analysis) is used for estimating the overall mass transfer coefficient of vapour and liquid phases (KOV and KOL) in a correlation which represented the data fairly well.
KOV = 3.3 * 10-10
... Show MoreIn this study, the energy charging mechanism is mathematically modeled to determine the impact of design modifications on the thermofluidic behavior of a phase change material (PCM) filled in a triplex tube containment geometry. The surface area of the middle tube, where the PCM is placed, is supported by single or multi-internal frustum tubes in vertical triplex tubes to increase the performance of the heating and cooling of the system. In addition to the ordinary straight triplex tubes, three more scenarios are considered: (1) changing the middle tube to the frustum tube, (2) changing the inner tube to the frustum tube, and (3) changing both the internal and central tubes to the frustum tubes. The impact of adopting the tube desig
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More