NA Nasir, H Amir, Faculty of medicine - Iraq, 2017 - Cited by 13
The research is exposed to an important issue, related to communication obstacles that prevent the media message contained in cultural topics published in local newspapers to reach the hands of the readers; or related to lack of awareness of aspects of that media message, Because it contains immersed vocabulary in elitism where, sometime, the average reader of the newspaper of medium-sized educated, and even the academic reader are unable to decode it and understand its significance.
After determining the problem of the study and the tools that the researcher wants to use to accomplish his research, a sample of students of college of Arts at the University of Baghdad was selected. As they are clo
... Show MorePurpose: To contribute to the development of an appropriate program for the management of medical waste based on clear-cut principles in order to reach the overall goal of improving the public health and environment of the population in our country.
Design / Approach / Introduction: The research is based on the analytical descriptive approach as a method of study in the field of data collection using a check list and analysis of the data through the use of some statistical treatments.
Results: The need is to establish a medical waste management in hospitals and follow international standards in all stages of waste management from sorting, collection, transportation and treat
... Show MorePhysical model tests were simulated non-aqueous phase liquid (NAPL) spill in two-dimensional
domain above the water table. Four laboratory experiments were carried out in the sand-filled
tank. The evolution of the plume was observed through the transparent side of this tank and the
contaminant front was traced at appropriate intervals. The materials used in these experiments
were Al-Najaf sand as a porous medium and kerosene as contaminant.
The results of the experiments showed that after kerosene spreading comes to a halt (ceased) in
the homogeneous sand, the bulk of this contaminant is contained within a pancake-shaped lens
situated on top of the capillary fringe.
The attached Cyanophyta community is a model for monitoring aquatic systems and interpreting environmental change in aquatic systems. The present study aims to conduct a seasonal study on Cyanophyta attached to the concrete abutments of three bridges (Al-Jadriya Bridge, Bab Al-Moadam Bridge, and Al-Muthanna Bridge) in the Tigris River within the city of Baghdad, central Iraq (from October 2021 to June 2022). The study included the quality of Cyanophyta and, the eleven environmental parameters (water temperature, electric conductivity, salinity, pH, total alkalinity, Calcium, Magnesium, dissolved oxygen, total dissolved solids, total phosphorus, and total nitrogen). Monthly samples were taken from the water under each bridge from three sa
... Show MoreThe main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t
... Show MoreObjectives: The study aims at finding the effectiveness of dietary habits on urolithiatic patients at Urinary Units
in Baghdad Teaching Hospitals.
Methodology: A quantitative descriptive study was conducted to identify the effectiveness of dietary habits on
(100) of urolithiatic patients in Urinary Units at Baghdad Teaching Hospitals starting from May 2011 to Sep.
2012.Data were collected through the use of constructed check list of the questionnaire format, which
consists of two parts: - The first part: is related to the patient's demographic variables ; the second part: is
constructed to serve the purpose of the study (effectiveness of the dietary habits). The total number of items
of the questionnaire is (69) item
Twenty-two of the Starling Sturnus vulgaris Linnaeus, 1758 were collected in Baghdad city during the period from January to September, 2014, and examined for endoparasites. Ten (45.45%) were found infected with either the cestode Passerilepis crenata (Goeze, 1782) (31.81%) or the nematode Dispharynx nasuta (Rudolphi, 1819) (13.63 %). Morphometric and meristic features for these worms were expressed. D. nasuta is recorded here for the first time from S. vulgaris for Iraq.
The records of Primary Health Care Centres (Al-Risafa section of Baghdad) were inspected for communicable diseases during the period January-April 2006. There were 8622 recorded cases (the diagnosis was based on a clinical examination and laboratory findings), which were distributed as 4782 (55.5%), 1430 (16.6%), 1604 (18.6%) and 806 (9.3%) for Sadar city, Risafa, A'adhamyiah and Mada'in, respectively. The highest frequency was reported for chicken pox (42.7%), followed by mumps and typhoid fever (20 and 13.7%, respectively), while diphtheria and cholera were not recorded. These three most frequent diseases were further analyzed, and their distribution showed a significant difference (P ? 0.001). April was the month of the highest recorded
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.