Arthropod-borne infections, known as vector-borne diseases, are a significant threat to both humans and animals. These diseases are transmitted to humans and animals through the bites of infected arthropods. In the last half century, there have been a number of unexpected viral outbreaks in Middle Eastern countries. Recently, Iraq has witnessed an outbreak of the Crimean-Congo Hemorrhagic Fever virus with high morbidity and mortality rates in humans. However, very little is known about the prevalence and distribution of CCHFV in Iraq, and therefore, it is impossible to quantify the risk of infection. CCHFV is transmitted to humans through the bite of infected ticks. However, transmission can also occur through contact with the blood or tissues of infected animals during slaughter or through contact with contaminated objects or surfaces. Accidental crushing of infected ticks can also release the virus and lead to transmission. In addition, healthcare workers and family members caring for infected individuals are at risk of infection through exposure to contaminated body fluids and aerosols. There are still many unknowns about the role that vertebrates play in the upkeep and spread of CCHFV. Critical information for our comprehension of CCHFV ecology may be gleaned through experimental studies conducted on wild animals and cattle. Therefore, the purpose of this review is to draw attention to current studies and publications that shed light on the intricate dynamic between CCHFV, vector, and host and demonstrate how biosurveillance at each stage aids in our knowledge of disease transmission, risk, and future research prospects.
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Background: Globally, hepatitis B is one of the most common infectious diseases. Estimates indicate that at least 2 billion people have been infected with the hepatitis B virus (HBV), with more than 378 million people being chronic carriers. Those individuals at higher risk for acquiring HBV and transmitting disease like pregnant women should be screened for hepatitis B surface antigen (HBsAg) to prevent transmission by vaccination and operation. Aim of study: The aim of this study was to determine the prevalence of HBsAg and its associated parameters in pregnant women who referred to antenatal clinic in Baghdad Province. Methods: The 234 apparently healthy pregnant women and their families, husbands and children were se
... Show MoreBackground: Swine influenza (also Called pig influenza, swine flu, hog flu and pig flu) is an infection by any one of several types of swine influenza virus (SIV) or S-OIV (Swine-Origin influenza virus) is any strain of the influenza family of viruses that is endemic in pigs. Patients and Methods:- Ninety patients with there families suspected of swine flu who were admitted to Central Teaching Hospital of Pediatric in Baghdad seventy one from Baghdad Al-Kerkh, twelve from Baghdad Al-Rasafa and seven other Iraqi Governorate (1 in Suleimaniya, 2 in Baquba, 4 in Anbar) they were included in a prospective study started from the 1st October till the 30 th of November 2009. Results:- The study revealed from )90( suspected cases the H1N1 Virus Pos
... Show MoreABSTRACT Background: Dental anomalies of teeth are major issue that contributes to dental problems encountered in general practice. The aim of this study is to measure the prevalence of dental anomalies and the associated etiological factors among 15 years old students in Basrah city –Iraq. Materials and methods: The total sample composed of 1000 students (435 males and 565 females) from urban area selected randomly from different high schools in the city. Diagnosis of dental anomalies were recorded by present or absent, diagnosis and recording of enamel defects were done according to the criteria of WHO (1997). Results: The prevalence of hypodontia was 4.6%, Females have higher prevalence than males (5.8% females and 3.0% males), ta
... Show MoreAbstract: Urinary Tract Infections (UTIs) are the most common bacterial infection in humans and a major cause of morbidity and they are the most common cause of hospital visits worldwide. Proper knowledge in identifying factors associated with urinary tract infection may allow the intervention to easily control of the disease in a timely manner. Therefore, the purpose of the study is determining the prevalence of UTI, diagnosis of causative bacterial agents and identifying the factors associated to the urinary tract infection among patients attending Medical City Hospital in Baghdad, Iraq. A total of 237, morning mid-stream urine samples were collected aseptically and the samples were diagnosed according to the standard methods. I
... Show MoreSports skills in some individual games require physical and motor qualities to facilitate the process of skill performance and also require the instructor or trainer to use more than one strategy, method and way to bring the performance to the level of mastery and avoid injury. The aim of the research is to know the effect of using special exercises using tools and their effect on teaching the skill of a front shoulder circle. The research hypothesis is that using special exercises with tools has a positive effect on teaching the skill of a front shoulder circle on the rings apparatus. Research method: - The researchers used the experimental method by designing two equal groups, the control and the experimental, to suit the research
... Show MoreThe current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreThe two most popular models inwell-known count regression models are Poisson and negative binomial regression models. Poisson regression is a generalized linear model form of regression analysis used to model count data and contingency tables. Poisson regression assumes the response variable Y has a Poisson distribution, and assumes the logarithm of its expected value can be modeled by a linear combination of unknown parameters. Negative binomial regression is similar to regular multiple regression except that the dependent (Y) variables an observed count that follows the negative binomial distribution. This research studies some factors affecting divorce using Poisson and negative binomial regression models. The factors are unemplo
... Show More