Preferred Language
Articles
/
ABcU2pIBVTCNdQwCZcJf
Spectrum of CT appearance and CT severity index of COVID-19 pulmonary infection in correlation with age, sex, and PCR test: an Iraqi experience
...Show More Authors
Abstract<sec> <title>Background

Since June 2020, an explosion in number of new COVID-19 patients has been reported in Iraq with a steady increment in new daily reported cases over the next 3 months. The limited number of PCR kits in the country and the increment in the number of new COVID-19 cases makes the role of CT scan examinations rising and becoming essential in aiding the health institutions in diagnosing and isolating infected patients and those in close contacts. This study will review the spectrum of CT pulmonary changes due to COVID-19 infection and estimate the CT severity score index and its relation to age, sex, and PCR test results.

Results

The ground glass opacities were the most common encountered pattern of pulmonary changes and were seen in (79%). There was strong positive correlation between higher CT severity score and male gender (p value = 0.0002, R2 = 0.9). Also, there was significant correlation of CT severity score and increasing age (p value less than 0.00018). Significant correlation was seen between CT scan percentage of lung involvement and positive PCR test results (p value = 0.001917), as the CT severity index is increasing, the PCR test is more likely to be positive.

Conclusions

Chest CT is an important and fast imaging tool for the diagnosis of COVID-19-infected patients especially in developing countries. In addition, chest CT can predict the disease severity by showing the percentage of lung involvement and hence give an idea about the prognosis of the disease. Higher CT severity score is significantly correlated with male gender, older age group patients and likely positive PCR test.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment
...Show More Authors
Abstract<p>The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme</p> ... Show More
View Publication
Scopus (15)
Crossref (5)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Directorship Vision in Epic Drama Shows " AWNI KROMI AS AN EXAMPLE"
...Show More Authors

View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
The Multifunctional Morphemes in Kurdish Language the Morpheme Le as an example
...Show More Authors

Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses

... Show More
Preview PDF
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
International Area Studies Review
Sub-National Governments’ Interactions in International Affairs: An Arab Perspective on Paradiplomacy
...Show More Authors

In the last years of the twentieth century, scholars solidly focused on paradiplomacy as a study subject, linking it to federalism and decentralised systems. In the Arab world, which has 22 countries, a few states have adopted federalism or decentralisation. Only five countries, i.e., 22.7%, have adopted federalism and decentralised experience. Therefore, limited research and academic work has been conducted regarding paradiplomacy. This paper aims to research the relationship between federalism and paradiplomacy conceptually and practically and then analyse the Arab experiences in federalism and whether they applied paradiplomacy and succeeded in doing so. To explore that, the paper studies and compares the related articles of constitution

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2024
Journal Name
International Area Studies Review
Sub-National Governments’ Interactions in International Affairs: An Arab Perspective on Paradiplomacy
...Show More Authors

In the last years of the twentieth century, scholars solidly focused on paradiplomacy as a study subject, linking it to federalism and decentralised systems. In the Arab world, which has 22 countries, a few states have adopted federalism or decentralisation. Only five countries, i.e., 22.7%, have adopted federalism and decentralised experience. Therefore, limited research and academic work has been conducted regarding paradiplomacy. This paper aims to research the relationship between federalism and paradiplomacy conceptually and practically and then analyse the Arab experiences in federalism and whether they applied paradiplomacy and succeeded in doing so. To explore that, the paper studies and compares the related articles of constitution

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
College Of Education For Women Journal
The Quest for an Ideal Beauty in Toni Morrison The Bluest Eye
...Show More Authors

In The Bluest Eye (1970) , Toni Morrison addresses a timeless problem of white racial dominance in the United States and points to the impact it has on the life of black females growing up in the 1930's. Morrison in this novel explores how Western standards of ideal beauty are created and propagated with and among the black community. The novel not only portrays the lives of those whose dark skinned and negroid features blight their lives; it also shows how the standards of white beauty are imposed on black youth to cause a damage of one's self-love and esteem which usually occurs when beauty goes unrecognized

View Publication
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Prepared (PbS) Thin Film Doped with (Cu) and Study Structure Properties
...Show More Authors

In this research PbS and PbS:Cu films were prepered with thicknesses (0.85±0.05)?m and (0.55±0.5)?m deposit on glass and silicon substrate respectively using chemical spray pyrolysis technique with a substrate temperature 573K, from lead nitrate salt, thiourea and copper chloride. Using XRD we study the structure properties for the undoped and doped films with copper .The analysis reveals that the structure of films were cubic polycrystalline FCC with a preferred orientation along (200) plane for the undoped films and 1% doping with copper but the orientation of (111) plane is preferred with 5% doping with the rest new peaks of films and appeared because of doping. Surface topography using optical microscope were be checked, it was found

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Calculation Mars – Earth distance and Mars orbital elements with Julian date
...Show More Authors

In this paper, the Mars orbital elements were calculated. These orbital elements—the major axis, the inclination (i), the longitude of the ascending node (W), the argument of the perigee (w), and the eccentricity (e)—are essential to knowing the size and shape of Mars' orbit. The quick basic program was used to calculate the orbital elements and distance of Mars from the Earth from 25/5/1950 over 10000 days. These were calculated using the empirical formula of Meeus, which depended on the Julian date, which slightly changed for 10000 days; Kepler's equation was solved to find Mars' position and its distance from the Sun. The ecliptic and equatorial coordinates of Mars were calculated. The distance between Mars and the center of the E

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref