Hepatitis B virus (HBV) infection is a global public health problem. It is estimated that there are 240 million HBV carriers in the world, of whom roughly 600,000 die annually from HBV-related liver disease. A total of 150 individuals were included in this study, 130 individuals of them had hepatitis B infection (patients group); HBs-Ag was detected in their sera by enzyme linked immunosorbent assay (ELISA) technique and was confirmed by real time PCR analysis to detect the viral genetic material, the others were control. Most of HBV patients in this study were located within 20-40 years group with a percentage of 47.7% and within the 40-60 years group with a percentage of 38.5%. Acute infection was confirmed by detection of anti-HBc IgM
... Show MoreBackground: Axillary lymph node (ALN) enlargement with diffuse cortical thickening and conserved echogenic hilum may represent a diagnostic and therapeutic challenge. Sonographic strain elastography may help the characterization of borderline ALN.
Aim: To evaluate the strain elastography of borderline ALN and to calculate a cutoff value of strain ratio (SR) that can identify suspicious ALN with the highest sensitivity and specificity to reduce unnecessary invasive procedures.
Subjects and Methods: A prospective study included 45 patients who attended the Breast clinic in Oncology Teaching Hospital with borderline axillary lymphadenopathy (intact hilum and diffusely thic
... Show MoreAbstract:
In its theoretical farm, the research adobet the subject of human resource management strategies and the cognitive skills. It comes as result of the rapid development which considers it human resource. as main axis in organization , the research in includes ,connective analysis , between human resource management strategies and cognitive skills which is considers one of the new concept that should be studied widly so that the organization can be able recognize it as concept and type and its importance for people in the organization.The study method was descriptive and analytics , it identified collation of hypothesis which were by statist too
... Show MoreIn light of the intellectual and technological progress within the current developments of time, as well as the emergence of digital tools and means of display and communication, which had a major role in the shifts of the time of globalization in various commercial and economic fields, as well as areas of transferring the design image and its stages of development to customers and the convergence of views between the customer and the interior designer, which are the most important pillars of the design process As a whole, and accordingly, there is an urgent need for a process of intellectual balance between them through digital tools from the technical side and through social media from the intellectual side. Customer comments via socia
... Show MoreThe phenotypic characteristics in the interior spaces are seeing the result of the ability of the designer in his handling of the vocabulary and the elements to deliver a specific meaning for the recipient , and is working to stir up the receiver and make it effective in the process of perception of space. So the theme of the role of phenotypic characteristics is of great significance in the process of analyzing spaces to reach the goal of the main idea , and show those qualities through relationships design in terms of shape, color and texture ... etc. , to reach also designs more beautiful , and creating an internal environment , creative and continuous with its external environment , Hence the importance of research in that it tries t
... Show MoreIn this paper, we present a study of examples of writings that are known in the science of Semitic research compared to the texts (Jewish-Arab, Samaritan-Arabic) written in Hebrew script and texts from the Bible. We try to explain the role of these literary works in Islamic history and civilization, as one of the most important documents are the writings (Gniza), which contributed to provide a full presentation on life in the Islamic community in all aspects of life, especially religious activity and showed the sincere relationship in dealing with the other under tolerance The University of Cambridge has prepared Islamic documents and kept them in separate boxes and presented them to researchers to convey the Islamic heritage written by
... Show MoreBackground: CT (computed tomography) is one of the first noninvasive imaging techniques in diagnosis of intra-axial posterior fossa tumors because it can accurately demonstrate, localize and characterize brain tumors, and can provide important information about the anatomic location, size, shape of the lesions and their mass effect on adjacent structures.
Objectives: To evaluate multi detectors CT characteristics of intra axial posterior fossa tumors and correlation of the CT characteristics of intra- axial posterior fossa tumors with the histopathological findings.
Patients & Methods: This is a cross sectional study including 26 patients with intra-axial posterior fossa tumors,15 males &11 females ,three cases were exclude
The current research aims to measure the impact of the skills of human resources management professionals in information technology in Iraqi private banks, as the skills of human resources management professionals constitute the modern trend of banks' interest in employees with outstanding performance, and the presence of information technology in banks is a prerequisite for dealing with the huge amount of data. And converting it into information to support the decision-maker in light of a complex environment, and the field research problem was the presence of a clear lack of interest in the skills of human resource management professionals and the weak adoption of information technology, which was reflected negatively on the compet
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show More