This research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maximum degree feasible by either converting input pure vowels to their direct IA counterparts or replacing them with their closest IA match.
This study aimed to isolate and identify Cryptococcus species from three distinct sources: sputum samples of pigeon fanciers, dried pigeon droppings, and eucalyptus tree leaves. A total of 150 specimens were collected over a two-month period, comprising 50 samples each from human sputum, pigeon droppings collected across various areas of Baghdad, and eucalyptus leaves obtained from the Baghdad College of Veterinary Medicine. All samples were cultured on Sabouraud dextrose agar supplemented with chloramphenicol and incubated at 25°C for 2–3 days. From the initial cultures, 20 isolates presumptively identified as Cryptococcus spp. were obtained: 6 isolates (12%) from human sputum, 9 isolates (18%) from pigeon droppings, and 5 isol
... Show MoreBackground: Osteoarthritis OA is the most common joint disorder in the world. Injection of high molecular weight hyaluronic acid intra-articular with steroid is a one of the used therapeutic option for patients with (OA)knee.
Objectives: Objective of this study was the evaluation the efficacy, safety, pluse duration of action of viscosupplementation of the HMWHA( high molecular weight hyluranic acid ).
Type of the study: Cross-sectional study.
Methods: From 81 patients with sever knee pain due to OA (grades 3–4) were recruited from Al-Yarmouk teaching hospital & a private clinic during the period from January 2014 till July 2016.
... Show MoreThe study aimed to identify the psychological counseling skills and the strength of the ego in the educational counselors, and to identify the relationship of statistical significance between the psychological counseling skills and the strength of the ego in the educational counselors, and to identify the differences of statistical significance in the relationship between psychological counseling skills and the strength of the ego in the guides according to the gender variable(male, Females), the number of sample (100) guides, including (50) males and (50) females from the area of Atifiya and Qadissiya and Ameriya in the Directorate of Education Karkh / 1, the researcher adopted a scale of psychological counseling skills prepared b
... Show MoreTo evaluate the toxicity of benzalkonium chloride in aquaculture, the hemato-serological indices of Nile tilapia Oreochromis niloticus are used as biomarkers. Following exposure to three concentrations of benzalkonium chloride BAC 0.1, 0.25, 0.50, and 1 mg/l (BAC1,2,3 and 4) in aquaria for two durations 21 and 42 days, the microbiological assay in fish aquaria, in addition to blood parameters were assessed. Except for the mean difference between BAC2 and BAC3 (P > 0.05) at 42 days, the mean values of the bacterial counts revealed a significant difference between all compared groups (0.05 ≥ P ≤ 0.01). Following exposure to the lower concentrations of BAC (1, 2 and 3), the main blood parameters of Oreochromis niloticus namely red bl
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MorePurpose: To compare the antibacterial-enhancing efficacy of aloe vera and honey in salicylic acid topical formulations against acne. Method: Six formulations containing 5 % salicylic acid were developed as creams and gels as follows: Formulations S, V and H were creams containing salicylic acid alone (S), salicylic acid with 28 % aloe vera (V), and salicylic acid with 10 % honey (H). Formulations J, M, and B were gels containing salicylic acid alone (J), salicylic acid with aloe vera 20 % (M) and salicylic acid with 12 % honey (B). Each formula was evaluated for colour, odour, pH, viscosity, spreadability, and stability under different temperatures (25, 30, and 60oC) and times (1 hour, 1 day, and 1 week). Furthermore, antibacterial
... Show MoreChronic kidney disease (CKD) is described as an abnormalities of renal function, existing for a long period of time. By reason of the early grades of Chronic kidney disease can be experiences no symptoms, its premature identification is strenuous. initial stage CRD can cause various complications, such as anemia, matabolyic disorders of bone mineral. The study was done to assess the effect the chronic renal disease stage on the Osteoprotegerin, 1,25 dihydroxyvitamin D, Obestatin levels and some biochemical parameters in patients not undertaken dialysis therapy. In this case-control study fifty-five patients with Kidney failure and fourty healthy people were examined. Circulating concentrations of Osteoprotegerin, 1,25 dihydroxyvitamin D
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More