Background: Staphylococcus spp. are widely distributed in nature and can cause nosocomial, skin infections, and foodborne illness, and it may lead to severe financial losses in birds by causing systemic infection in numerous organs. Aim: This study was conducted to determine the prevalence of Staphylococcus spp. in humans and birds in Baghdad city. Methods: Seventy-six oral cavity swabs were collected, including 41 from birds and 35 from breeders. All samples were examined by bacteriological methods and identified by using the VITEK technique, the samples were then further studied to test the ability of biofilm formation, and MDR factors and MAR index were tested with the use of seven antibiotics. Results: Among the 76 oral swa
... Show MoreThe study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, (Central Children Hospital and Children's Protections Educational Hospital) The Iraqi Ministry of Health, the Department of Health Baghdad .the period from the first of 2015 September to the first of December 2015, Were obtained isolates bacterial subjected to the cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system .The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar, golden yellow color on the Trypton Soy agar and green color on t
... Show MoreAt the last years, the interesting of measurement spicilists was increased to study differential item functioning (DIF) wich is reflect the difference of propability true response for test item from subgroups which have equal level of ability . The aims of this research are, inform the DIFat Namers’scale(2009) for mental health to prepare students and detect items that have DIF. Sample research contants (540) students, we use Mantel- Haenzel chi-square to detect DIF. The results are point to there are (26) items have DIF according to gender which are delated form the scale after that.
Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and his family and companions until the Day of Judgment.
The words of God Almighty are for the sake of the greatest and greatest speech, and the scholars, may God have mercy on them, raced.
To dive into knowing the word of God and what he intended, so they wrote in it the literature and collected works in it, and explained it to those after them.
And when the noble companions, were extremely eloquent and eloquent, because the Holy Qur’an was revealed in the language of the Quraysh, and all the Arabs knew their language, they understood the Holy Qur’an and applied it p
Lymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing i
... Show MoreThis research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe
... Show MoreAchieving the Book of Return to the End of the Book of Alimony from the Manuscript of the Forum of the Abhar of the Sheikh (Abraham Bin
Muhammad ibn Ibrahim al-Halabi (d. 956 AH), who was a member of the Hanafi sect, was a long man
Fiqh, interpretation, modernity, Arab sciences, and readings
Hanafi as well as that he was Abid Zahid and the reason for his claim to this book that asked him some
He asked him to take advantage of it
Al-Hanafiya said, mentioning the sources from which he was taken, and presented his opinion and evidence on the correct
He mentioned the issues of the Hanafi jurisprudence in his book according to the chapters of the jurisprudence
Reaction is done to what you have achieved previously in the h