Preferred Language
Articles
/
jkmc-302
Hemoptysis Hospital Based Study, At AL- Kindy Teaching Hospital
...Show More Authors

Background: Expectoration of blood that originated in the lungs or bronchial tubes is a frightening symptom for patients and often is a manifestation of significant and possibly dangerous underlying disease. Tuberculosis was and still one of the common causes followed by bronchiactasis , bronchitis, and lung cancer. Objectives: The aim of this study is to find the frequency of causes of respiratory tract bleeding in 100 patients attending alkindy teaching hospital.Type of the study: : Prospective descriptive observational study Methods of a group of patients consist of one hundred consecutive adult patients, with Lower respiratory tract bleeding are studied. History, physical examination, and a group of selected investigations performed, including complete blood examination and blood film, PT, PTT, sputum direct gram and AFB stain, cytology ,chest radiography, CT scan, and bronchoscopy when indicated.Results: pulmonary tuberculosis, acute bronchitis, lung carcinoma, and bronchectiasis are the major causes of hemoptysis in our study with 27%, 23%, 23%, 20% respectively. Of the included patients 63% were males, specially age 41-60, while 37% were females. The primary malignancy is more common than secondary cancer, and that squamous cell carcinoma, and adenocarcioma, are the most common.Conclusions: Tuberculosis is the main cause of lower respiratory tract bleeding, followed by lung carcinoma bronchitis, and bronchiactesis. Most of the patients are males and in middle age , sever bleeding is not common and squamous cell carcinoma is commonest cause regarding malignancies followed by adeno carcinoma

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Obscene speech in the Qur'anic perspective An objective study based on the verses and interpretation of the Noble Qur’an in diagnosis and treatment
...Show More Authors

t:

The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.

What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
An Experimental Study of the Server-based Unfairness Solutions for the Cross-Protocol Scenario of Adaptive Streaming over HTTP/3 and HTTP/2
...Show More Authors

Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The psychological, social and academic problems that encounter students of college of education in Al-Anbaar University /Al-qaim
...Show More Authors

The study aims to identify the psychological, social, and academic problems that encounter students at the college of education. To this end, the researcher utilized the descriptive approach, where a questionnaire was used as a tool to collect the study data. The findings of study revealed that the main academic problems are inability to understand what the students read, lack of concentration over the process of studying. The Difficulty of preparation for test. Lack of ability to memorize quickly. As for the prominent social problems: the excessive usage of social media that drove students away from their main tasks, the Lack of participation in social activities, the scarcity the religious information. The psychological problems includ

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Al-Bayhaqi’s Preferred Opinions in his Book Al-Khilafiyat-Chapter of Breastfeeding: عذراء حميد فريح , وايمن عبد القادر الهيتي
...Show More Authors

This research is a comparative jurisprudential study that focuses on Imam Al-Bayhaqi’s preferred opinions in his book Al-Khilafiyat (The Disagreements), the part of Al-Rida’a (Breastfeeding). It is considered one of the most important familial topics that is concerned with organizing the social relations in Islam, strengthens the family ties and that prevents the family disintegration due to the ignorance and lack in comprehending Sharia laws (Islam law) in all aspects. The study follows the inductive and descriptive method. It aims at examining the prohibition of marriage when breastfeeding takes place at the time of woman’s conversion to Islam or during her infidelity period. It further aims at verifying the prohibition

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The aesthetic formation of metaphor Textual reading in the office of Majd al-Din al-Nashabi (D. 656 A.H)
...Show More Authors

وظَّفَ الشاعرُ مجد الدين النُّشَّابي الصورة الاستعارية التي شكلت سمةً جمالية بارزة من سماتِ التشكيل الشعري عنده, وأحد المكونات الأساسية في بنية قصائده الشعرية وهي جوهر الإبداع ومحط التذوق عند المتلقي, إذ يشكل الشاعر صوره الاستعارية المتنوعة متولدة من خياله وعواطفه ومتوافقة مع الموضوع لتصبح الصورة  الاستعارية ركنًّا من أركان التشكيل الفني الشعري عند الشاعر .

والتصوير الاستعاري له القدرة بالتشكيل ا

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 17 2023
Journal Name
Migration Letters
Employing the Teleological-Causal Presumption between Al-Khwarizmi and Ibn Yaish’s Explanations of Al-Mufasal (even) as a Model
...Show More Authors

It is a moral presumption that includes the object for its sake, and it is called the object for it or the object for its sake, which is the present tense after (lam, ki, fa, willn, and then), and it is not an excuse for the occurrence of the matter (1), and it requires a connection between the two sides of (a cause with a cause) united by a reason for a specific purpose (2). The object has a reason or an excuse, because it is an explanation of what came before it, of the cause. The reason for the occurrence of the action, being the motive for causing the action and the bearer of it (3), indicates that the infinitive is restricted to a special reason. So if I said: (I came to you with the hope of honoring you), then I attributed the coming

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (13)
Crossref (7)
Scopus Crossref