Background: Candida tropicalis is one of the most causes of vulvovaginal candidiasis (VVC) in women. Systemic candidiasis and candidemia may also occur in pregnancies. Objective: This study was carried out to detect and isolate of this yeast from aborted placenta, which may cause severe complications such as spontaneous abortion. Materials and methods: Fresh aborted placenta were collected and washed by normal saline to remove the blood. Then, cut it into portions and place it in test tube containing 5 ml of normal saline. Finally, shake for 10 minutes, after that, cultured for microbial isolation. Isolation and detection were done by some conventional methods with Api candida and CHROMagar. Results: The results showed that four isolates of C. tropicalis (2%) were isolated from two hundreds samples from placenta of aborted women. Conclusions: Even with its rare occurrence, C. tropicalis has the ability to initiate intrauterine infection.
The World witnessed over the past few decades a clear change in the urban existence map, where the number of cities' residents has increased and the cities geographic area expanded, also networks of roads and electric power stations were spread. This extraordinary events caused the drawing of a different identity to the world, race with itself in the field of energy and raw materials consumption. Therefore, the research issue individualizes in the lack of available knowledge concerning the subject of environment friendly ecological urban desiging and planning.So the research aims to define the environmentally friendly eco-city' structural elements and to clarify their most important planning and design foundations. To In
... Show MoreAbstract Drug addiction is considered a criminal behavior, which led the Iraqi legislator to prohibit and criminalize it, imposing penalties on those who use or even approach it. This aims to limit its presence in Iraq and reduce unethical behaviors, leveraging the divine prohibition to curb it. The legislator also encourages media organizations to raise awareness about the dangers of this substance, which has contributed to reducing the phenomenon of drugs in Iraq.
After the year 2003, Iraq went through multiple waves of violence and at different levels on the security, intellectual, political and social levels. Behind that stood several motives and incentives to enable violence that represented the first axis of research, the most important of which was the political motives that circulated an atmosphere that politics against society and transformed power into a field of political brutality against the individual and the group at once. There are also cultural, intellectual, media and economic motives such as weak cultural independence, poverty, marginalization, unemployment and want, and the absence of a media discourse that rejects violence but incites it, on the other ha
... Show Moreوظَّفَ الشاعرُ مجد الدين النُّشَّابي الصورة الاستعارية التي شكلت سمةً جمالية بارزة من سماتِ التشكيل الشعري عنده, وأحد المكونات الأساسية في بنية قصائده الشعرية وهي جوهر الإبداع ومحط التذوق عند المتلقي, إذ يشكل الشاعر صوره الاستعارية المتنوعة متولدة من خياله وعواطفه ومتوافقة مع الموضوع لتصبح الصورة الاستعارية ركنًّا من أركان التشكيل الفني الشعري عند الشاعر .
والتصوير الاستعاري له القدرة بالتشكيل ا
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Praise be to Allah, the Lord of the Worlds, the best prayer and the best prayer, on our master Muhammad, and on his pure God, and his companions and the faithful, and who followed them by charity to the day of religion. This relationship between emphasis, is a sincere, and this harmony, such as the relationship between water, and the green, but it is good, but, with greenery, it is better, and as well as alone, is a beautiful view, but the most beautiful, with the most beautiful. From here he was starting on myself in writing the fundamentalist research of jurisprudence, to show the depth of this interconnection. The doctrine as a new term, then the taj al-Din al-Suobki came after three centuries, and a
... Show MoreResearch Summary :
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:
This is a brief research that contained its two rudders the command and its Style in Surat Al-Ma’idah a fundamental rhetorical study, and the study clarified the meaning of imperative in both; the Arabic language and in the terminology of the fundamentalists and rhetoricians in a concise manner, and then indicated the imperative of the command , the true meaning, and the meanings interpretated as an imperative form. I have mentioned some verses of Surat Al-Ma’idah, so what I have quot
... Show MoreThe problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu