Background: Hand, foot, and mouth disease is viral disease caused commonly by coxsackie virus A16 virus. It is a mild disease and children usually recover with no specific treatment within 7 to 10 days. Rarely, this illness may be associated with aseptic meningitis were patient may need hospitalization.
Objective: To determine significance of clinical features of hand, foot and mouth disease.
Methods: A cross sectional study of cases with clinical features of hand, foot and mouth disease visiting the dermatological consultation unit of Al Kindy teaching hospital. Sampling was for Zyona and Edressi Quarter patients over the period of 1st December 2017
... Show MoreThe research aims to study Sabkha mineralogy to determine the mineral types, the nature of the precipitation, and the patterns of salt crystallization. Two Sabkhas in Abu Ghraib, west of Baghdad, were studied. It was found that the Sabkhas were formed in flat ponds from saturated solutions in a semi-arid to arid climate. Halite predominates, followed by anhydrite and gypsum as evaporite minerals. As for the minerals of the Sabkha soil, it consisted of feldspar, calcite, quartz, and dolomite, in addition to the clay minerals represented by kaolinite, illite, and chlorite. Needle forms, hopper shapes, dendritic crystals, and polygon shapes are the main crystallization patterns dominantly found in the Sabkhas. All these types of crysta
... Show MoreThe research aimed to prepare a measure to evaluate the academic achievement of graduates working in the field of physical education from their point of view, to identify the extent to which graduating students benefit from the curriculum of the College of Physical Education and Sports Sciences, University of Baghdad/Al-Jadriya, and to identify the impact of academic subjects in the practical and theoretical fields. The researchers used the descriptive approach in the research procedures as it is an appropriate approach in achieving the research objectives. The following questions are: What are the academic subjects that have the most impact on graduating students? What are the academic subjects that have the least impact on the are
... Show MoreThis research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show More