Leishmaniasis is a transmissible infection brought about by an obligatory intracellular protozoan from the genus Leishmania. It occurs worldwide in tropical and subtropical regions and can be burdensome in resource-constrained countries. The infection ranges in severity from mild cutaneous lesions to more severe and sometimes life-threatening visceral and distorting mucocutaneous sicknesses. Importantly, cutaneous leishmaniasis (CL) is prevalent in the Middle East with a pooled prevalence of 12%. It imposes a significant health and socioeconomic burden
المستخلص [English] Peace-building is a science that has its foundations and needs mechanisms, components, studies and plans based on the needs of the parties responsible for achieving peace and meeting the necessary needs of conflict societies, as it has become a goal sought by many local and regional actors and parties. The State of South Africa has realized this fact and has devoted space in its conception and planning to addressing the issues of conflict and war within the framework of its unitary work.Since security and stability in general seek to create peaceful and legal means through which existing problems can be expressed and addressed. The differences have varied to build peace and create cooperation between groups and th
... Show MorePurpose To extract the lower anterior teeth, the oral surgeon needs to anesthetize the pulpal tissue of the accused tooth and the surrounding tissues. The lingual nerve innervates the lingual soft tissue to the lower teeth, this nerve usually anesthetized alongside the inferior alveolar nerve by a block technique. However, the lingual tissue of the lower anterior teeth usually anesthetized by either infiltration or periodontal ligament injection (PDL) techniques. This study was intended to compare between these two techniques. Methods Forty-eight teeth were extracted from 24 patients. Non-adjacent two lower anterior teeth in the same patient were selected. The lingual soft tissue in one of them was anesthetized by PDL injection technique wh
... Show MoreAbstract
The research was limited to those whom Imam Abu Dawood
described in his Sunan as weak, so this research does not include
narrators who carried descriptions indicating weakness such as
ignorance or others, nor does it include hadiths that the Imam
described as weak.
The number of narrators whom Imam Abu Dawood described as
weak has reached six narrators, and my methodology was to
mention the words of Imam Abu Dawood, then transfer the
sayings of other advanced scholars, as well as the sayings of
Imam Abu Dawood in his other books, if any, to show the extent
of compatibility between these sayings.
I have reached the following resul
... Show MoreThe value of time out as a time not count of official time form the game like four periods and extra time also it considered a great interest if used well thru the game , the importance of this problem is not using well the time out and when the coach ask for time out and how to invest this time legally to make good results also there is no observing system as the researcher see gives the reality image that the coach is successful lead the game when he takes time out . The goals of research that knowing on numbers of time out for excellent teams in Iraq (first &second) stages and putting special inventory reverse reality of asking time out (positive &negative) on playing basketball , the hypothesis of research that tell the time out effect
... Show MoreKey words:Jasminumsambac, Volatile oil, Antioxidant.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More