Coronavirus disease 2019 (COVID-19) is a flu-like infection caused by a novel virus known as Severe Acute Respiratory Syndrome coronavirus 2 (SARS-CoV-2). After the widespread around the world, it was announced by the World Health Organization (WHO) as a global pandemic. The symptoms of COVID-19 may arise within 2 weeks and the severity ranged from mild with signs of respiratory infection to severe cases of organ failure and even death. Management of COVID-19 patients includes supportive treatment and pharmacological medications expected to be effective with no definitive cure of the disease. The aims of this study are highlighting the management protocol and supportive therapy especially vitamin D and manifesting the clinical symptoms by patients in Iraq. An observational study was conducted on 200 patients and descriptive parameters for data were calculated to analyze the results. The mean age was 42.56±17.49 years and the majority of patients were presented with mild to moderate symptoms (78%). There were many different pharmacological treatment regimens and random doses and duration of vitamin D were taken by the patients. In conclusion, a non-specific treatment protocol was used for the patients without compliance to the national guidelines for management and treatment of COVID-19 patients in Iraq with the administration of a wide range of pharmaceutical agents that required monitoring for their safety and efficacy. Vitamin D is administered in different doses and duration without depending on the basal serum concentration.
In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreBackground:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients
Background: Pervasive Developmental Disorder (PDD) is a term refers to the overarching group of conditions to which autism spectrum disorder (ASD) belongs .
Objective: This study was designed to determine the existing behavior of children with autism in dental sitting, the behavior improvements in recall dental visits and evaluate the improvement in oral hygiene with using specific visual pedagogy chart.
Type of the study: Cross-sectional study.
Methods: Forty children of both genders, ages ranged from 4 – 6 years having primary teeth only were selected whose medical history included a diagnosis
... Show MoreSpelling correction is considered a challenging task for resource-scarce languages. The Arabic language is one of these resource-scarce languages, which suffers from the absence of a large spelling correction dataset, thus datasets injected with artificial errors are used to overcome this problem. In this paper, we trained the Text-to-Text Transfer Transformer (T5) model using artificial errors to correct Arabic soft spelling mistakes. Our T5 model can correct 97.8% of the artificial errors that were injected into the test set. Additionally, our T5 model achieves a character error rate (CER) of 0.77% on a set that contains real soft spelling mistakes. We achieved these results using a 4-layer T5 model trained with a 90% error inject
... Show MoreThe present work was aimed to form the baseline data of normal morphological and histological structure features of liver in migratory starling (Sturnus vulgaris). Anatomically, the starling liver bird was dark red -brown in colour and located in the cranial third of the abdominal cavity and consisted of undivided lobes (left and right). The liver right lobe was larger than the left. Histological examination revealed that the liver parenchyma was covered by a connective tissue capsule which appears to be thicker in the rim of liver lobes than other area in the liver lobe. Liver parenchyma was arranged in an unlimited hepatic lobules, which composed of polygonal hepatocytes organized as irregular, radial interconnecting cords or laminae of o
... Show More: The aim of this research is to investigate the impact of Woods ' strategy in collecting second graders average for physics. To achieve the objective researcher coined the following hypothesis: there was no statistically significant difference at a level (0.05) between the average grades of the experimental group students studying physics as Woods and strategy between the average control group students who are studying the same article in the regular way. Test collection. Search sample amounted to (83) students and (42) students for the experimental group, and (41) students for the control group. Students were subjected to test experiment is composed of (30) after the completion of the experiment. And use appropriate statistical methods re
... Show MoreDBN Rashid, International Journal of English Linguistics, 2019 - Cited by 2
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show Moreالخلاصة
یعد والت وتمن شاعرا استثنائیا سواء أكان ذلك في المكانة التي یحتلھا في الأدب الأمریكي او في نمط
اع t ذا الإیق t لة ھ t ة وص t وافقي خاص t اع الت t تخدامھ الإیق t ي اس t دي ف t ر تقلی t عرا غی t الشعر الذي یكتبھ. لقد كتب وتمن ش
ل t ة للتوص t ف الطبیع t وافقي لوص t اع ا لت t ن الإیق t تخدم وتم t ر ، اس t بوحدة الكون الذي عبر عنھ في شعره.وبمعنى آخ
نص t ل ال t جام داخ t رابط وانس t یج مت t ھ نس t ق انظم t دف لخل t ھ تھ t اھره أدبی t واف
The city of Samawah is one of the most important cities which emerged in the poverty area within the poverty map produced by the Ministry of Planning, despite being an important provincial centre. Although it has great development potentials, it was neglected for more than 50 years,. This dereliction has caused a series of negative accumulations at the urban levels (environmental, social and economic). Therefore, the basic idea of this research is to detect part of these challenges that are preventing growth and development of the city. The methodology of the research is to extrapolate the reality with the analysis of the results, data and environmental impact assessment of the projec