
Blood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w
... Show MoreObjective(s): To determine the impact of health education program toward their end-stage renal failure (ESRF)
patients’ knowledge through a follow-up approach each two months post program implementation for six months.
Methodology: "Follow-up" longitudinal design by using time series approach of data analysis and the application of
pre-post tests approach for the study group and the control group. The study is conducted in Al-Shahid Ghazi Hariri
Teaching Hospital for Surgical Specialties/Centre for Disease and Renal Transplant, and Al-Khayal private Hospital for
renal disease and transplantation during the period from August, 29th
, 2010 through February, 28th
, 2011. To achieve
the objectives of the study, purp
To determine the relationship between Helicobacter pylori infection and reproduction disorder (recurrent spontaneous abortion), twenty women patients who undergo spontaneous abortion during first trimester of pregnancy (20-38) years and have been investigated from 2015/12/1 -2016/3/1 and compared to fifteen healthy individuals. All subjects were carried out to measure anti-H. pylori IgA and anti- H. pylori IgG antibodies by enzyme linked immunosorbent assay (ELISA). There was significant elevation (p≤ 0.05) in concentration of anti- H. pylori IgG Abs (6.30± 0.99) compared to control group (4.48± 0.61) and IgA Abs (5.42 ± 0.90 U /ml) as compared to control group (3.92 ± 0.41 U/ml). The percentage of H. pylori IgG and IgA was 20% and 25
... Show MoreA kindergarten teacher is one of the most important elements in the educational process, since she is totally relied upon in kindergartens. Therefore, she could have basic and healthy characteristics to improve the educational process by directing the child towards a perfect growing upEducating and raising up a child should be an organized process that makes desirable changes in the child’s behavior in order to improve different sides of his personality, such as his appearance side, his mental side, and his social side.
This research aims at:
1- Measuring the scientific brilliance in kindergarten teachers.
2- Investigating the statistical significant differences of the scientific brilliance among kindergarten teachers in accor
The current study aims at identifying:
1-The intellectual stress of counselors according to gender variable (male, female ).
2-The five major factors of the Counselor's Personality.
3- The relationship between intellectual stress and the five major factors of the councilors' personality and according to gender variable (male, female ).
4-The significant differences in the relationship between intellectual stress and the five major factors of the councilors' personality and according to gender variable (male, female ).
The sample of the study includes (260) counselors (130 male
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.