BACKGROUND: Febrile neutropenia occurs in more than 80% of patients with hematological malignances specially after chemotherapy cycles and an infectious source is identified in approximately 20–30%. Various bacterial, viral, and fungal pathogen contribute to the development of neutropenic fever and without prompt antibiotic therapy mortality rate can be as high as 70%. AIM: The objective of the study was to document the current sites of infection in patients with febrile neutropenia in hematological ward in Baghdad Teaching Hospital, the microorganisms and antibiotic susceptibly in culture positive cases and mortality rate in 1 week and 4 weeks after episode of fever. PATIENTS AND METHODS: One hundred cases of febrile neutrop
... Show MoreThe general budget is usually linked to the role of the state in public life and economic activity, whether this role is neutral or interventionist and thus reflects the general objectives that the state seeks to achieve.
for importance of the public budget in clarifying the image of the political state philosophy and its objectives it seeks to achieve on the one hand and clarifying the degree and rank it occupies in the ladder of development among the other countries. This study is intended to highlight the concepts of the general budget and how its concept has evolved since the Middle Ages. Of the importance of the general budget in Iraq was not based on scientific and objective and then the study
... Show MoreActinomycetes are free, spore-forming, high (G+C) ratio (>55%) saprophytic microorganisms that are widely distributed in most soils, colonize plants, and are prevalent in water. This is frequently accompanied by the production of filament airborne mycelium. Actinomycetes are well-known microcolonies for creating antibiotics and other critical bioactive components that are beneficial to humans. Approximately 70% to 80% of commercially available medications and antiviral active compounds have been synthesized so far. Secondary metabolites produced by microbes have the potential to be used in a variety of sectors, including antimicrobial agents, enzyme technology, pigment manufacture, antitumor agents against cancer cells, and toxin pr
... Show MoreObjective To investigate the accuracy of gingival crevicular fluid (GCF) E-cadherin and total antioxidant capacity (TAC) to discriminate periodontal health from disease. Subjects and Methods GCF samples were collected from participants with periodontal health (control), gingivitis, and periodontitis (n = 25 each group). The latter group was further subdivided according to stage (S) and grade. Periodontal parameters were recorded then levels of biomarkers were assayed using ELISA and antioxidant status by use of the Total Antioxidant Capacity Assay for E-cadherin and TAC, respectively. Results All periodontal parameters were significantly higher in periodontally diseased groups than controls. The GCF E-cadherin significantly increased
... Show MoreAs smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf
... Show MoreThe analysis of the hyperlink structure of the web has led to significant improvements in web information retrieval. This survey study evaluates and analyzes relevant research publications on link analysis in web information retrieval utilizing diverse methods. These factors include the research year, the aims of the research article, the algorithms utilized to complete their study, and the findings received after using the algorithms. The findings revealed that Page Rank, Weighted Page Rank, and Weighted Page Content Rank are extensively employed by academics to properly analyze hyperlinks in web information retrieval. Finally, this paper analyzes the previous studies.
The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta
... Show MoreIn present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronicall
... Show MoreThe recognition of handwritten numerals has many applications in automatic identification and cognition. This research contains three experimented scenarios to recognize the handwritten English (i.e. Arabic) numerals. In the first scenario the bilinear interpolation of the image is used, while in the second scenario and after the bilinear interpolation is being applied, the Sobel operators are applied on the resulted interpolated image. In the third scenario which represents the last one, the effect of normalization of image dimensions is tested. 550 images of handwritten numerals were tested. Three types of tests were conducted for each scenario namely: trained-set test, not-trained-set test and comprehensive-set test. Depending on the
... Show More