Background: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.
Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.
Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.
... Show MoreAs part of farm animal surveillance for tuberculosis the prevalence of Mycobacterium bovis and other mycobacterial species in horse fecal specimens wasevaluated.Thedistributions of these organisms in horses are rarely diagnosed in horses. Nevertheless, it was possible to obtain noteworthyinformation on diagnosis, manifold clinical signs and epidemiological relationships from available literature. Mycobacterial infections caused both by M. aviumcomplex (MAC)are occasionally diagnosed inhorses in Iraq. Finally, under certain conditions, horses may become a source of mycobacterial infectionsfor other animal species or for immunocompromised humans. Identification was made by classical biochemical tests,Mycobacteria were isolated from 18 (18.75%
... Show MoreA simple and rapid spectrophotometric method for the determination of sulphite SO3-2 is described. The method is based on the rapid reduction of known amount of chromate CrO4-2 in the presence of sulphite in acidic medium of 2N H2SO4. The amount of excess of chromate was measured after it reactions with 1,5-diphenylcarbazide which finally gives a pink-violet, water soluble and stable complex, which exhibit a maximum absorption at 542 nm. Beer's law was obeyed in the concentration range from 0.004-6.0 µg of sulphite in a final volume of 25 ml with a molar absorbtivity of 4.64×104 l.mol-1.cm-1, Sandal's sensitivity index of 0.001724 ?g .cm-2 and relative standard deviation of ±0.55 - ±0.83 depending on the concentration level. The present
... Show MoreIn this study, the CR-39 detector technique was used, to estimate the uranium concentration from the soil in midland refineries Company (Doura refine (, Baghdad, Iraq. Uranium concentrations in soil samples have been measured using solid state nuclear track detector type CR-39. Nine soil samples were collected from different areas within the Doura refinery and other soil samples were collected form Abu Tayara Street and ALshortaa District outside the refinery for comparison. The results showed variable values for uranium concentrations. The average value of uranium concentration was found to be 0.37 ppm in doura refinery. For areas outside the refinery, the concentration of uranium was 0.008 ppm. Thes
... Show MoreIn this study, a new adsorbent derived from sunflower husk powder and coated in CuO nanoparticles (CSFH) was investigated to evaluate the simultaneous adsorption of Levofloxacin (LEV), Meropenem (MER), and Tetracycline (TEC) from an aqueous solution. Significant improvements in the adsorption capacity of the sunflower husk were identified after the powder particles had been coated in CuO nanoparticles. Kinetic data were correlated using a pseudo-second-order model, and was successful for the three antibiotics. Moreover, high compatibility was identified between the LEV, MER, and TEC, isotherm data, and the Langmuir model, which produced a better fit to suit the isotherm curves. In addition, the spontaneous and exothermic nature of the adsor
... Show MoreIn this study, a new adsorbent derived from sunflower husk powder and coated in CuO nanoparticles (CSFH) was investigated to evaluate the simultaneous adsorption of Levofloxacin (LEV), Meropenem (MER), and Tetracycline (TEC) from an aqueous solution. Significant improvements in the adsorption capacity of the sunflower husk were identified after the powder particles had been coated in CuO nanoparticles. Kinetic data were correlated using a pseudo-second-order model, and was successful for the three antibiotics. Moreover, high compatibility was identified between the LEV, MER, and TEC, isotherm data, and the Langmuir model, which produced a better fit to suit the isotherm curves. In addition, the spontaneous and exothermic nature of the adso
... Show MoreAbstract. In this research, the uranium concentration in (16) water samples collected from some agricultural areas surrounded with AlTuwitha nuclear site in Baghdad-Iraq was measured by using a CR-39 detector. The concentration of uranium in this study was from (0.6 ± 0.33mg/l) to (2.51 ± 0.49 mg/l), and the weighted average for the concentrations (1.262 ± 0.402 mg/l). The results showed it is a concentration of uranium level in water samples studied is higher than the allowed limit recommended by WHO and ICRP.
In recent years, the attention of researchers has increased of semi-parametric regression models, because it is possible to integrate the parametric and non-parametric regression models in one and then form a regression model has the potential to deal with the cruse of dimensionality in non-parametric models that occurs through the increasing of explanatory variables. Involved in the analysis and then decreasing the accuracy of the estimation. As well as the privilege of this type of model with flexibility in the application field compared to the parametric models which comply with certain conditions such as knowledge of the distribution of errors or the parametric models may
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More