Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreBackground: Disc battery ingestion is a common
serious problem in Iraq. It increase in the last years
because of the increase in number of electronic toys
that uses these batteries. These batteries contains
many types of irritant chemicals that increases the
risk of it's ingestion.
Methods:We reviewed the medical records of
children aged between 1year and 7 years
old admitted to Surgical Specialty Hospital/Baghdad
Medical City due to disc battery ingestion from
January 2007 through December 2010). The diagnosis
of disc battery ingestion was based upon history,
clinical symptoms, and results of imaging studies.
The clinical data reviewed included sex, age, clinical
manifestation and duration of sy
The goal of current research to identify the implications of intellectual and psychological drawings of women in prison in Sulaimaniya province through her paint and collected through cooperation with the creativity of the development organization of women in Sulaimaniya, consisted search of five chapters, the first chapter contains the goals of the research and its problem and its significance in addition to its limits and determine the terminology, while the second chapter included the theoretical framework and the literature on the subject of the search, and in the third quarter where he explained the researchers research methodology and procedures, either in the fourth quarter may offer researchers graphics prisoners and then read th
... Show MoreBackground: Parvovirus B19 is a human pathogenic virus associated with a wide range of clinical conditions. During pregnancy congenital infection with parvovirus B19 can be associated with poor outcome, including miscarriage, fetal anemia and non-immune hydrops.
Objective: The study aimed to determine the prevalenceof Parvovirus B19 DNA in pregnant women attending the Military hospital in Khartoum, demonstrating the association between the virus and poor pregnancy outcomes.
Subjects and methods: This study was a cross sectional study, testing pregnant Sudanese women whole blood samples (n= 97) for the presence of Parvovirus B1
... Show MoreInterleukin-38 (IL-38), an inflammatory cytokine discovered in recent years, has been implicated in the pathogenesis of systemic lupus erythematosus (SLE). IL-38 is encoded by the
Carbamazepine is an anticonvulsant agent which acts on the central nervous system and used for the treatment of epilepsy. Carbamazepine was formulated as an oral extended release tablets using ethyl cellulose as retardant substance. Different types of tablets additives such as cellulose materials (sodium carboxymethyl cellulose and microcrystalline cellulose ), lactose, calcium phosphate and solubilizing agents ( sodium lauryl sulphate and polyethylene glycol 6000) were utilized to study their effect on the release profile of drug from ethyl cellulose matrices. It was found that sodium carboxymethyl cellulose increased the carbamazepine release and the same effect was obtained when the same amount of microcrystalline cellulose used
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.
Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f
... Show More