Background: Toxoplasma gondiiis an obligate intracellular protozoan that may infect nearly all warm-blooded animals, including humans. T gondiiis thought to infect one-third of the human population.The symptoms depending on the adequacy of the immune antiparasitic response. In humans, the main source of infection is through contact with the feces of infected cats, the final host in which the T. gondii completes its life cycle. Other source of infection occurs when drinking raw milk, ingestion of contaminated meat. Aim: This descriptive study estimated the seroprevalence and risk variables for Toxoplasma gondii infection forundergraduate students of a college of Pharmacy who were studying at University of Baghdad. The frequency rate ofToxoplasma was 23.8% for IgG and 5.97% for IgM antibodies. The frequency of the parasite 804-3811in male were higher than female, but with non-significant difference (P-value was greater than 0.05). The differences between the Toxoplasmosis infection and the contact with an animal were also not statistically significant. The only variable that had a positive association with seropositive T. gondii was the blood group; the association considered significance with level > 0.05.Attention is better to be taken to this important part of the community to grantee a healthy offspring capable of building the country.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThis research is an initial attempt to explore the reality of reform and its concept in Islam, and to describe the presence of educational practices in the Arab-Islamic heritage. The importance of this research lies in addressing a number of important issues related to the contemporary Islamic reform system. The research showed the need for authentic educational reform values that draw their reference from the origins of Islam. The research also emphasized the analysis of the reality of education in the Muslim world and the identification of its problems and the search for solutions through a quick and comprehensive look at the diverse contributions of Muslim thinkers to Islamic educational reform thought, and their active role in addressin
... Show MoreFor many years, the construction industry damages have been overlooked such as unreasonable consumption of resources in addition to producing a lot of construction waste but with global awareness growth towards the sustainable development issues, the sustainable construction practices have been adopted, taking into account the environment and human safety. The research aims to propose a management system for construction practices which could be adopted during constructing different types of sustainable buildings besides formulating flowcharts which clarify the required whole phases of sustainable buildings life cycle. The research includes two parts: theoretical part which generally ,handles the sustainability concepts at construction i
... Show MoreThe Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show Moresix specimens of the Hg0.5Pb0.5Ba2Ca2Cu3-y
Superconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th
Moisture damage is a primary mode of distress occurring in hot mix asphalt (HMA) pavements in Iraq. Because of the loss of bond, or stripping, caused by the presence of moisture between the asphalt and aggregate, which is a problem in some areas and can be severe in some cases, it is requires to evaluate the design asphalt mixture to moisture susceptibility. Many factors such as aggregate characteristics, asphalt characteristics, environment, traffic, construction practices and drainage can contribute to stripping. Asphalt concrete mixes were prepared at their optimum asphalt content by superpave system and then tested to evaluate their engineering properties, which include tensile strength, resilient modulus, and perman
... Show MoreThe importance of operational risks increases with the increase in technological development, the development of banking operations, the extent of banking compliance, and the attempt of many banks to achieve quality in banking services. And the extent of the position occupied by Iraqi banks for banking compliance and reducing operational risks. The Basel Committee (2) paid its attention to operational risks and the interest of international banks to follow policies that work to ensure banking compliance and cover operational risks, because of its role in reducing losses due to increased costs and achieving an increase in profits. Realizing and working to confront the best possible and traditional methods, that some risks Operational problem
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.