Tumours in pets occur naturally and are common in dogs as they are in humans. Tumours of the alimentary system have been reported in animals, although less frequently. Food patterns and specific diet components could have a big role in such tumour occurrence. Therefore, the aim of this study was to investigate the clinical signs and inspect the neoplasm lesions of the gastrointestinal (GI) tract grossly and histopathologically in dogs in Baghdad, Iraq, and to see whether pet diets had any tumourigenic effect. Throughout two years sixteen dogs were referred to Teaching Animal Hospital and private clinics at Baghdad city with masses in (GI) tract. Males and large size breeds were more likely to be affected with GI tumours. Half of the cases aged 5-10 years and belonged to German Shepherd, while the other half involved the other breeds (i.e. Belgian Malinois, Labrador, Pointer GSP and Terrier) equally. Biopsies were taken from the tumour tissues for histological examination. Clinically, the animals presented general signs of digestive system abnormalities, like difficult defecating, bloody stool, lethargy and weight loss. Grossly, the tumours varied in their sizes from <3 cm to >5 cm in diameter, and the most frequent site of occurrence (10 out of 16 cases) was in the large intestine. Histologically, most tumours reported were malignant, and included adenocarcinomas (6/16) followed by leiomyosarcoma (4/16), adding to 2/16 belonged to carcinoid tumour. However, lipoma and viral papilloma (4/16) were also registered as benign tumours. In conclusion, tumours of canine digestive system do exist but rare. Healthy nutrition of dogs may prevent this type of cancer by consuming enough amount of raw meat, little artificial food, e.g. kibble along with some vegetables and fruits. Additionally, the information gained from dogs could be used to suspect and test the effect on humans as they have strong pathophysiology similarities.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca
... Show MoreObjective(s): To assess the level of depression and anxiety among school age children with acute lymphoblastic leukemia under chemotherapy treatment and to find out the relationship between the level of depression and anxiety among the affected children and their demographic characteristics.
Methodology: A cross-sectional study was conducted on school age children both gender having acute lymphoblastic leukemia under chemotherapy treated and their age between 6 years to 12 years. The study started from the period of September, 19th 2020 to March,1st 2021. Non-probability (Purposive) sample of (114) children with acute lymphoblastic leukemia under chemotherapy was selected in attending hospital wards, outpatient and counseling clinics
Abstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show MoreThis research will deal in a simple way with the concept of urban expansion and taking the decision to sign the spatial signature of residential investment projects in order to reach through them in a real way to the extent of the proportionality of the decision taken, in light of the fulfillment of the conditions that must be met in the matter of making the decision of the spatial signature of the residential investment project and the extent of commitment to them, in which the conditions are: (Ease of access to services and transportation, adequacy of services, commitment to urban land uses) when establishing the investment project represented by the Al-Ayad residential project in the Hittin neighborhood of Al
... Show MoreThe research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The results showed
... Show More