A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreBACKGROUND: Mental health problems are reflected and linked to human behavior in many aspects. Medical students are susceptible to a wide variety of events that compromise their mental well-being, social life as well as their academic achievements. AIM: This study aimed to find the impact of social support on medical students’ behavior in Iraq via assessing their depression, anxiety, and stress status. METHODS: A cross-sectional online survey-based study targeted all medical students in Iraq. The employed questionnaires covered mental health status of participants by evaluating their perceptions of depression, anxiety, and stress using. Data were analyzed using the Statistical Analysis System. RESULTS: The study revealed a signifi
... Show MoreThe aim of the research is to determine the impact of the Iraqi public budget on IPSASs by conducting the questionnaire; the research was based on the hypothesis that "there is an impact of the adoption of the International Accounting Standards in the general budget of Iraq”. The research concluded that the government accounting system closely interferes with the general budget at all stages. The shifting towards the accrual basis is the first element of the reform package towards reaching the reform of the state budget. Without reforming government accounting, it is almost impossible to develop the budget. IPSASs are a recognized reference to the assessment and development of governmen
... Show MoreObjective: The present study investigates whether the exposure to low-power diode laser induces denaturation in red blood cell (RBC) membrane protein composition, and determines the irradiation time for when denaturation of membrane protein process begins. Background: A low-energy laser has been used extensively in medical applications. Several studies indicated significant positive effects of laser therapy on biological systems. In contrast, other studies reported that laser induced unwanted changes in cell structure and biological systems. The present work studied the effect of irradiation time of low-power diode laser on the structure of membrane proteins of human RBCs. Materials and methods: The RBC suspension was divided into five equa
... Show MoreThe nephrotoxicity induced by methotrexate is a severe condition that greatly affects its therapeutic potential and has a significant inflammatory component. Fimasartan is an angiotensin receptor blocker that offers organ-protective effects and may be useful in mitigating renal injury. The present study explored the anti-inflammatory potential of two doses of fimasartan against methotrexate-mediated nephrotoxicity. Albino rats were intraperitoneally administered a single methotrexate (20 mg/kg). Intraperitoneal treatment with fimasartan (5 or 10 mg/kg/day) was initiated on day two after methotrexate injection and continued for seven consecutive days. Methotrexate significantly increased serum urea, creatinine, and NGAL concentrations. It al
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreObjectives: To identify the effectiveness program on nurse- midwife practice concerning performed
cardiotocography to pregnant women and to find out the relationship between nurse- midwife practice and
certain studied variables.
Methodology: A quasi-experimental design (pretest-post test approach) was conducted at three sector AlRussafa
directorate, AL- Karckh directorate and Medical City Directorate from the period of March, 26th 2014
to August, 30th 2015. A non-probability sample consisted of (130) nurse -midwives were selected and divided
into two groups (65) nurses-midwives (case group) who exposed to the educational program and (65 ) nursesmidwives
who didn't expose to the program considered as control group . D
Tigris River is one of the main important surface water resources in Iraq. This necessitates continuous study of its quality . The present study is concerned with the characteristics and quality of Tigris water passing through in Baghdad city. (eight) samples were collected from the river in the area Grea't City. The study periods were carried over four season, which has been sampled once represent the every season. First sampling 12-11-2012 represent the autumn season The second sampling 20-1-2013 to represent the winter season. The third in 25-3- 2013 to represent the Springer season. The fourth during 29-5-2013 to represent the summer spring season. In order to specify the water quality, a group of physical and chemical analyses have bee
... Show More