Objective; swine flu is known to be caused by influenza A subtypes H1N1,H1N2, H2N3, H3N1, and H3N2, was first proposed to be a disease related to human flu during the 1918 flu pandemic, Iraq face the epidemic of 2009, many patients admitted to the medical word of alkindy teaching hospital, the clinical features were observed and managed according to WHO protocols.
The aim of the study; is to asses some features of morbidity and mortality of swine flu epidemic admitted patients in 2009 in alkindy teaching hospital.
Methods; A total 131 patients with suspected influenza
admitted to Alkindy Teaching Hospital all complain of
fever more than 38c, sore throat with or without cough.
The admitted patients are of two main
groups;a)seventeen secondary school pupils on their
return from US,b)one hundred fourteen patients
admitted from October till end of December 2009.
History ,clinical examination and routine investigations
for all patient in addition to blood samples and swabs
from nose and throat were taken and sent to the central
lab to test for H1N1 by PCR(real time).
Results; fifty three (42%) of our patients found to have swine flu by positive test (real time PCR). It show that there is no relation of age whether young or old to being infected with swine flu or non swine flu (p>0.05). Table 2 also show that gender had no relation to possibility of infection with both non swine flu and swine flu influenza (P <0.05). We found that there was no difference of mortality between swine flu and non swine flu types (p>0.05) and pneumonia are more commonly associate influenza of negative test for swine flu virus (p<0.001). headache is more common in swine flu while chill is more common in non swine flu (p<0.05) in addition diabetes is more commonly associate swine flu than other types of influenza (p<0.05).
Conclusion; This study concluded that mortality in
swine flu influenza is not different from mortality in
non swine flu influenza. Also age and gender had no
relation to possibility of having swine flu infection .
Pneumonia found to be more in non swine flu,
headache associate swine flu more than non swine flu
and chills associate swine flu. Diabetes associate swine
flu more than non swine flu but smoking had no
relation
Background: The skull base and the hard palate contain many anatomical features that make them rich in information which are useful in sex differentiation; in addition to that they have the ability to resist the hardest environmental conditions that support them in making sex differentiation. Three dimensional computed tomographic techniques has important role in differentiation between sex since it offers images with very accurate data and details of all anatomical structures with high resolution. This study was made to study sex variations among Iraqi sample by craniometric linear measurements of the hard palate and the skull base using 3D reconstructed Computed Tomographic scan. Materials and methods: This study composed of 100 Iraqi su
... Show MoreThe electrical activity of the heart and the electrocardiogram (ECG) signal are fundamentally related. In the study that has been published, the ECG signal has been examined and used for a number of applications. The monitoring of heart rate and the analysis of heart rhythm patterns, the detection and diagnosis of cardiac diseases, the identification of emotional states, and the use of biometric identification methods are a few examples of applications in the field. Several various phases may be involved in the analysis of electrocardiogram (ECG) data, depending on the type of study being done. Preprocessing, feature extraction, feature selection, feature modification, and classification are frequently included in these stages. Ever
... Show MoreCohesion is well known as the study of the relationships, whether grammatical and/or lexical, between the different elements of a particular text by the use of what are commonly called 'cohesive devices'. These devices bring connectivity and bind a text together. Besides, the nature and the amount of such cohesive devices usually affect the understanding of that text in the sense of making it easier to comprehend. The present study is intendedto examine the use of grammatical cohesive devicesin relation to narrative techniques. The story of Joseph from the Holy Quran has been selected to be examined by using Halliday and Hasan's Model of Cohesion (1976, 1989). The aim of the study is to comparatively examine to what extent the type
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreEnvironmental pollution is regarded as a major problem, and traditional strategies such as chemical or physical remediation are not sufficient to overcome the problems of pollution. Petroleum-contaminated soil results in ecological problems, representing a danger to human health. Bioremediation has received remarkable attention, and it is a procedure that uses a biological agent to remove toxic waste from contaminated soil. This approach is easy to handle, inexpensive, and environmentally friendly; its results are highly satisfactory. Bioremediation is a biodegradation process in which the organic contaminants are completely mineralized to inorganic compounds, carbon dioxide, and water. This review discusses the bioremediation of petroleum-
... Show MoreAPDBN Rashid, Review of International Geographical Education Online (RIGEO), 2021
Research summary
Praise be to God, Lord of the worlds, and prayers and peace be upon the one who was the most eloquent of people in language and the most eloquent of them in eloquence, our Master Muhammad (peace and blessings of God be upon him).
To proceed... There is no doubt that many studies have preceded me in talking about chalk, each according to his own destination and view, and what I do not deny is that I benefited a lot from it, and it provided me with a lot of valuable information, and I liked to be one of those study pens, trying as much as possible To add something new and different in the study, far from similarity and repetition. Especially in the Abbasid study.
The babble in the Abbasid society was d
... Show MoreKlebsiella pneumoniae is among the most frequent microorganisms isolated from infections of burn wounds. This cross-sectional study aimed to investigate the distribution of multi-drug resistant (MDR) K. pneumoniae in two burn hospitals and the antibiotic resistance profile in different burn regions of the same patient. It was performed in two hospitals (Al-Zahraa and Al-Karama) in Al-Kut, Iraq, between January and May 2022. Totally, 100 burn swabs were collected from 40 patients of both genders suffering from burn wound infections, with ages ranging between 3 and 50 years. Klebsiella pneumoniae were isolated and identified using conventional methods followed by VITEK®2 system and confirmed via polymerase chain reaction targeting t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the