The most common form of childhood cancer is leukemia, Calculation for more than one third of all childhood cancers among those ages 1 day – 14 years. The diseases of leukemia are worldwide, it occurred in both genders from male and females and in all age. A total of 80 different samples of patient children were collected from the central teaching hospital of pediatric in Baghdad. Obtained during the period from 1st Sept. 2019 till the 31 th of Aug. 2020. Each isolates identification by using Vitek 2. Isolated organism in leukemic children show 18 (22.5 %) gram positive and 62 (77.5 %) gram negative from the total sample 80 (100.0 %). The percent of male is 45 more than female which represents 35 in most age groups between age (1 day-3 year) 33 (100.0 %). In most distribution of organism according to the type of sample for gram positive is Staphylococcus aureus 13 (16.2 %) and gram negative Escherichia coli 21 (26.3 %), Klebsiella pneumoniae 13 (16.2 %), Pseudomonas aeruginosa 11 (13.8 %) from the total results 80 (100.0 %). In conclusion, the gram negative bacteria is more than gram positive bacteria and especially effect with Escherichia coli, and Staphylococcus aureus, in males for the age group 1 day to 3 years. And the most antibiotic sensitive to Escherichia coli is Imipenem, Amikacin, Gentamycin, Piperacillin/ Tazobactam and resist to Cefotazidime, Tobramycin, Cefepime, Ceftriaxone, Ciprofloxacin and Staphylococcus aureus most sensitive to Vancomycin, Gentamycin, Clindamycin, and resist to Penicillin, Cefotaxime, Ceftriaxone, Oxacillin.
Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show MoreBackground: The aim of this national oral health survey was to determine the prevalence of malocclusions due to some anomalies in the dentition among the 13 years old Kurdish students in sulaimani intermediate school. Materials and methods: The total sample was 950 (455 males and 495 females) which assessed by diagnostic set and special instrument. The clinical examination was mainly based on the definitions of Björk et al. Some variables were recorded as present or absent sometimes denoting the tooth or the teeth involved in malocclusion and their distribution according to the whole sample. Results: The results showed that 1)The most common extracted tooth was the mandibular first molar (2.9%). 2) At this age group the most common partial
... Show MoreRecently, it has been revealed that Toxoplasmosis may be associated with some factors related to type 2 diabetes, such as glucose, insulin, the Homeostatic Model Assessment for Insulin Resistant (HOMA-IR), and Fatty acid binding protein (FABP). Therefore, the current study aimed to specify how Toxoplasma gondii (T.gondii) infection affects glucose, insulin, HOMA-IR, and FABP among adolescents. From October to December 2022, this study was carried out at Al Madain Hospital in Baghdad. For a group of adolescents visiting the hospital, an ELISA test was performed to check their anti-T.gondii antibodies. Ninety adolescents were selected to participate in the study on the basis of this examination. They were divided into two groups: those who te
... Show MoreIn this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
In this research PbS and PbS:Cu films were prepered with thicknesses (0.85±0.05)?m and (0.55±0.5)?m deposit on glass and silicon substrate respectively using chemical spray pyrolysis technique with a substrate temperature 573K, from lead nitrate salt, thiourea and copper chloride. Using XRD we study the structure properties for the undoped and doped films with copper .The analysis reveals that the structure of films were cubic polycrystalline FCC with a preferred orientation along (200) plane for the undoped films and 1% doping with copper but the orientation of (111) plane is preferred with 5% doping with the rest new peaks of films and appeared because of doping. Surface topography using optical microscope were be checked, it was found
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More