Aim: The aim of this study was to investigate babesiosis in dogs of different breeds and ages and of both sexes in Baghdad Province by molecular detection of Babesia canis using conventional polymerase chain reaction (PCR) and sequencing followed by phylogenetic analyses. Materials and Methods: Blood samples were collected from 310 dogs of different ages and breeds, and of both sexes in different areas of Baghdad Province from December 2018 to September 2019; during clinical examinations, body temperature, pulse, respiratory rate, and signs of diseases were recorded. PCR was used to amplify a specific 450-bp fragment of the 18S rRNA gene of B. canis. PCR products were sequenced, and MEGA 6.0 software was used for analysis. Chi-square and odds ratio tests were used to investigate the prevalence and risk factors of babesiosis. Results: Clinical signs of babesiosis included paleness or icterus of the mucus membranes, tick infestation, and febrile illness during the acute and subacute phase. The prevalence of infection with B. canis was 5.1%, with the higher prevalence in male dogs and in dogs <3 years of age. Huskies were more likely to be infected than other dogs. Infection prevalence was highest in April and June and was higher in spring and summer than in winter. Using sequence data, 14 isolates of Babesia canis canis and one isolate of each Babesia canis rossi and Babesia canis vogeli were identified. Phylogenetic analyses of B. canis canis revealed that three shared clades and several isolated lineages were similar to other isolates (97-99% similarity), whereas B. canis vogeli and B. canis rossi showed similarities of 98% and 99% with isolates from other geographical regions. Conclusion: This study provides the first molecular record and phylogenic analysis of B. canis in dogs in Iraq, and it will be valuable for confirming clinical signs and studying epidemiological risk factors of babesiosis in dogs.
The present study aims at analyzing the polysemy of the English preposition in from the cognitive linguistic (CL) point of view using Evans' and Tyler's approach (2003). The perplexity faced by Iraqi second language learners (L2) due to the multi-usages of this preposition has motivated the researcher to conduct this study. Seventy-six second year university students participated in this experimental study. The data of the pre-test and post-test were analyzed by SPSS statistical editor. The results have shown the following: First, a progress of more than (0.05≤) has been detected as far as students' understanding of the multiple usages of the preposition in is concerned. Second, the results of the questionnaire have s
... Show MoreIn this work the parameters of plasma (electron temperature Te,
electron density ne, electron velocity and ion velocity) have been
studied by using the spectrometer that collect the spectrum of
plasma. Two cathodes were used (Si:Si) P-type and deposited on
glass. In this research argon gas has been used at various values of
pressures (0.5, 0.4, 0.3, and 0.2 torr) with constant deposition time
4 hrs. The results of electron temperature were (31596.19, 31099.77,
26020.14 and 25372.64) kelvin, and electron density (7.60*1016,
8.16*1016, 6.82*1016 and 7.11*1016) m-3. Optical properties of Si
were determined through the optical transmission method using
ultraviolet visible spectrophotometer with in the range
(
Mefenamic acid was esterified with starchwith[1:1] Molar ratio, as drug substituted with natural polymer, to prolongthe period of hydrolysis of drug polymer with other advantages. The new prodrug starch was characterized by FT-IR and UV-Visible and 1H-NMR spectroscopies. The physical properties were studied and controlled drug release was studied in different pH values at 37oC. The stability of drug was carried out by measuring the absorbance of mefenamic starch which hydrolyzed in HCl solution of pH 1.1 (artificial gastric fluid) and phosphate buffer of pH 7.4 (simulating intestinal fluid SIF) at 37oC for several days. The thermal analysis such as DSC was studied.
The study aims to identify the neurological perfectionism of talented girls with disabilities and do a case study for one of these girls. The sample of the study consisted of (11) female students at the university level, 5 females with disability and (6) normal female-students. The sample also included (19) secondary school female students in Tabuk region, including 10 students with visual disability and (9) normal students. The case study was limited to one case of mentally superior girls (talented) with kinetic disability. The researcher adopted the descriptive methodology (case study), he used neurological perfectionism scale, Salah Mekhemar interview, Stanford interfacial intelligence scale fifth picture, case study form. The re
... Show MoreMarriage is a holly secret in Christian religion .So it id natural that its ceremonies acquired religious form .In general the marriage is contracted by minister of religion in presence of the two parties or by a proxy or presence of parents if it is necessary . And to make the condition of publicity for the marriage ,its procedures must be made before witnesses .Also the minister of religionhave to confirm the agreement of the two parties before beginning the procedures.The marriage ceremonies are made.These procedures are religious traditions that includes praying and make blessings and putting the rings in fingers by thepriest . The marriage is a holly secret performed by the crown pray according to the church religious traditions
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show More
In the name of God, praise be to God, and prayers and peace be upon the best of God’s creation, Muhammad bin Abdullah, and upon his family and companions, and from his family:
And after:
He saw from verbs that transcend one effect if it is visual and to two effects if it is heart and this action has several strokes and it is an awareness of the sense and illusion and imagination and reason and in addition to that it has many meanings dealt with in the glossary books and as for what the verb included in the audio studies it is the explanation and deletion and slurring The heart of my place. As for what the grammatical studies included, it focuses on one or two effects according to its l
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More