Background: Despite the importance of vaccines in preventing COVID-19, the willingness to receive COVID-19 vaccines is lower among RA patients than in the general population. Objective: To determine the extent of COVID-19 knowledge among RA patients and their attitudes and perceptions of COVID-19 vaccines. Methods: A qualitative study with a phenomenology approach was performed through face-to-face, individual-based, semi-structured interviews in the Baghdad Teaching Hospital, Baghdad, Iraq, rheumatology unit. A convenient sample of RA patients using disease-modifying anti-rheumatic drugs was included until the point of saturation. A thematic content analysis approach was used to analyze the obtained data. Results: Twenty-five RA patients participated in this study. Regarding knowledge about COVID-19, most participants were able to define COVID-19, realize its contagious nature, and see the need for masks to get protection from this infection, while only a minority knew COVID-19 symptoms. Most participants obtained information about COVID-19 from TV programs and the public. Regarding COVID-19 vaccines, about 1/4 of the participants knew vaccine side effects, and only 12% of them had positive attitudes toward the vaccine. Additionally, 19 participants were unwilling to take the vaccine. The most common reasons behind this reluctance to take the vaccine include fear of the vaccine's short- and long-term side effects and the worsening of RA. Conclusion: RA patients' knowledge about COVID-19 and its vaccines was poor, and their attitudes toward COVID-19 vaccines were negative.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThe rehabilitation of deteriorated pavements using Asphalt Concrete (AC) overlays consistently confronts the reflection cracking challenge, where inherent cracks and joints from an existing pavement layer are mirrored in the new overlay. To address this issue, the current study evaluates the effectiveness of Engineered Cementitious Composite (ECC) and geotextile fabric as mitigation strategies. ECC, characterized by its tensile ductility, fracture resistance, and high deformation capacity, was examined in interlayer thicknesses of 7, 12, and 17 mm. Additionally, the impact of geotextile fabric positioning at the base and at 1/3 depth of the AC specimen was explored. Utilizing the Overlay Testing Machine (OTM) for evaluations, the research d
... Show MoreBackground Non specific colitis is defined as inflammatory condition of the colon that when examined microscopically lacks any characteristic features of any specific form of colitis and is commonly seen in reports of colonoscopy biopsies. There are many factors that cause it like obesity and H pylori.
Aim of the study To determine the association of obesity and H pylori as contributory factors to this disease.
Patients and methods This is a case-controlled study was carried out in Al-Kindy College of Medicine from January 2017 to June 2018. Sixty individuals were included; forty of them had non specific colitis. The rest were hea
A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli
... Show More
Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.
Research depend on quantitative and descriptive method, It
... Show MoreLow conversion copolymerization of N-vinyl-2-pyrrolidon M.W = (111.14) VP (monomer-1) has been conducted with acrylic acid AA and methymethacrylate MMA in ethanol at 70ºC , using Benzoyl peroxide BPO as initiator . The copolymer composition has been determined by elemental analysis. The monomer reactivity ratios have been calculated by the Kelen-Tudos and Finman-Ross graphical procedures . The derived reactivity ratios (r1 , r2 ) are : (0.51 , 4.85) for (VP / AA ) systems and (0.34 , 7.58) for (VP , MMA) systems , and found the reactivity ratios of the monomer AA , MMA is mor than the monomer VP in the copolymerization of (VP / AA) and (VP /MMA) systems respectly . The reactivity ratios values were used for microstructures calculation.
Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreThe research on coordination polymers chemistry based on organic-metal framework with bridging ligands has accelerated during the past two decades. It is an interested hot topic in the synthetic inorganic chemistry, which allowed the fabrication of a variety of interested materials. These materials have shown a range of applications including light harvesting and magnetic properties. The thesis is divided in three chapters. The first chapter gives a general introduction on the development of self-assembled polymeric species based on transition metal. It is also covered a summary of the literature review on the current state of the art on self-assembled coordination ploymers. Furthermore, it includes a description on various relevant topics
... Show More