Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of blood donations. In this study, genotypes (A, B, C and D) were detected, largely associated with blood donors residences and distributed to areas of Iraq through a map. Genotype A comprised 28 (34.6%) of blood donors and for genotype C it was 16 (19.8%) and both genotypes were found to be the predominant genotypes, followed by genotype B of 7 (8.7%) and D of 2 (2.5%), the latter is included into Mixed genotypes of 8 (9.9%), whereas, 22 (27.2%) were undetermined genotypes. Efforts should focus on these findings, which may indicate that Iraq is an endemic region of HHV-8 infection.
Objective; swine flu is known to be caused by influenza A subtypes H1N1,H1N2, H2N3, H3N1, and H3N2, was first proposed to be a disease related to human flu during the 1918 flu pandemic, Iraq face the epidemic of 2009, many patients admitted to the medical word of alkindy teaching hospital, the clinical features were observed and managed according to WHO protocols.
The aim of the study; is to asses some features of morbidity and mortality of swine flu epidemic admitted patients in 2009 in alkindy teaching hospital.
Methods; A total 131 patients with suspected influenza
admitted to Alkindy Teaching Hospital all complain of
fever more than 38c, sore throat with or without cough.
The admitted patients are of two main
groups
Money laundering is consider a crime in legal perspective and aphenomenon of negative effects in economic and Social perspective for thevarious countries of the world by the diversity of their economies to make thebadly damaged in the banking service and its reputation in some cases may leadto bankruptcy of banks, and the fact that banks is one of the most importantcircles that revolve the illicit funds, Due to its branched the banking operations,speed and overlap and increase it's complicated with the progress of bankingoperations and the use of electronic services modern here's challenges atvarious levels between the application of the legislation to combat moneylaundering and between actual fact it must find ways and means of legislat
... Show MoreThe present study include a new developed method of analysis for determination of drug Spironolaction (SP) in some Pharmaceuticals by Spectrofluorometric method. Spironolaction was determined under optimal experimental condition that follows :- The excitation spectrum was (l=351 nm), the emmetion spectrum was (l=518 nm), pH=1, the suitable temperature for reaction 60oC and the optimal time less than (3) minute. The analysis and rang statistical data was:-Linear dynamic rang (1-10) ?g.ml-1, the detection limit (D.L = 0.023 ?g.ml-1), Molar absorptivity (? = 29875 liter mole-1 cm-1), Relative standard deviation (%RSD = 0.78), (%Erel = 3.3) and recovery (Rec = 96.6) percentage. Determination of Spironolactone was accomplished by two methods
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This study aims to impact statement played by banking governance according to the decisions of the Basel Committee in achieving the strategic objectives of the banks, But order to achieve the this goal has been the adoption of two hypotheses in addition to the two main hypotheses as sub answered preliminary The study seeks to verify their health and two (no correlation relationship and impact between Banking governance and achieve strategic objectives), has been tested hypotheses. Study has reached
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show MoreBackground: Sonographic examination is an important tool in assessment of normal and abnormal cervical lymph nodes. The aim of the study is to assess the distribution and the characteristic features of normal cervical lymph nodes in a sample of Syrian population. Materials and Methods: Fifty healthy Syrian subjects (25 men and 25 women) with an age of 20 -60years old, who had their cervical lymph nodes examined by ultrasound. Three hundred and two lymph nodes were detected. Lymph nodes were evaluated for their number, size, site, echogenic hilus, shape, as well as for the border sharpness. The subjects were categorized by age into four groups, (20 -30, 31 - 40 , 41 - 50 , 51- 60 years ). Statistical analysis of data was done using SP
... Show MoreGenus Salix is among family Salicaceae, distributing in the northern hemisphere. It is represented in Egypt by two species (Salix mucronata and Salix tetrasperma). The classification of Salix at the generic and infra-generic levels is still outstanding. We have agreed to list the Egyptian species of this genus. We collected them during field trips to most Egyptian habitats; fresh and herbarium specimens were subjected to taxonomic revision based on morphological characters; scanning electron microscope (SEM) for pollen grains; isozyme analysis using esterase and peroxidase enzymes and genetic diversity using random amplified polymorphic DNA (RAPD). We recorded that both sexes of S.
This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show More