Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was used to amplify kinetoplast minicircle fragments DNA (kDNA). Conventional-PCR was performed for determination of some virulence factors (LPG1, GP63, CPA and PPG1 genes). The electrophoresis findings of kDNA gene showed two species of the parasite found in the study area, 65 samples were positive for cutaneous leishmaniasis, L. tropica at 750bp and L. major at 560bp. Generally, L. tropica (57.5%) was the most common specie and L. major (23.75%) appeared in a low level. There are no significant differences between the infections of males and females, while there are significant differences at the comparison between age groups. All virulence genes (LPG1, GP63, CPA and PPG1) appeared in all L. tropica isolates with high percentage (100%). L. tropica is the major specie which that caused CL in Thi-Qar province, while L. major appeared in low incidence. The virulence genes, which were reviewed, are necessary and important in pathogenesis of L. tropica.
In the present paper, Arabic Character Recognition Edge detection method based on contour and connected components is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content. The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .
... Show MoreThis study was aimed to develop an optimized Dy determination method using differential pulse voltammetry (DPV). The Plackett-Burman (PB) experimental design was used to select significant factors that affect the electrical current response, which were further optimized using the response surface method-central composite design (RSM-CCD). The type of electrolyte solution and amplitude modulation were found as two most significant factors, among the nine factors tested, which enhance the current response based on PB design. Further optimization using RSM-CCD shows that the optimum values for the tw
... Show MoreOne of the globalization results is (VAT) , so it is important to consider its results and impact on the tax system.
The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.
The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.
The history of (VAT)was also studied mentiorned and studied.
As a conclusion (VAT) is one of the m
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe physical and elastic characteristics of rocks determine rock strengths in general. Rock strength is frequently assessed using porosity well logs such as neutron and sonic logs. The essential criteria for estimating rock mechanic parameters in petroleum engineering research are uniaxial compressive strength and elastic modulus. Indirect estimation using well-log data is necessary to measure these variables. This study attempts to create a single regression model that can accurately forecast rock mechanic characteristics for the Harth Carbonate Formation in the Fauqi oil field. According to the findings of this study, petrophysical parameters are reliable indexes for determining rock mechanical properties having good performance p
... Show MoreThe interest in the intellectual capital and its development is a civilized necessity imposed by the requirements of the times and cannot imagine an advanced society in its potential productivity in poor efficiency of human capital, and features the work environment change permanently, putting the management of financial companies against a constant challenge toward coping with new developments in this changing environment and this is not taken unless owned by these companies qualified human resources and the provision of Culture organizers have, which manifested itself with the research problem by the following two questions:
- Did the intellectual capital value specific financial and
The period of the reign of King Ghazi saw many disorders in most parts of the country and the management disrupted and imbalanced, besides tribal unrests and political conflict and collision with British interests, Such as bad management in some regions and loss of government control over some administrative units, due to the position of the weak governments towards these problems, so it was necessary to change these Governments and Ministers to solve such problems. In contrast, the Iraqi government has focused on the army as the basis for a strong state and the protector on the existence of an external threat for the safety of the country, King Ghazi has helped in the development of competencies of the military, bringing the officers ex
... Show MoreThis study aimed to evaluate good manufacturing practices in food safety of ten different restaurants in the Al-Karkh area of Baghdad, Iraq. Forty samples collected from were collected from knives, food cutting boards, tables, hands and nails workers in restaurants. In addition. 70 food handlers were selected. Through structured interviews, information on the checklist for Good Manufacturing Practices in Food Safety, Food handlers’ general checklist for good hygiene, and Personal Hygiene Checklist were collected. The overall viable bacterial count before Good Hygiene Practices was significantly higher (P<0.05) than the total bacterial counts after Good Hygiene Practices. The highest viable bacterial counts before Good Hygiene P
... Show MoreAn extensive survey of citrus leaf miner (CLM) , Phyllocnistis citrella Stainton parasites
and predators was conducted during 1998 and 1999 in citrus orchards and nursuries in
Baghdad, Diyala and Wasit .Five eulophid parasites were recorded for the first time on citrus
leaf miner larvae , prepupae and pupae viz. Cirrospilus sp, Pnigalio sp ., Ratzburgiola
incompleta , Tetrasticus sp. and, Neochrysocharis formosa . Parasitism rate was ranged from
15% to 63% Chrysopa carnea , Orius albidipennis , Amblyseius sp . Were observed as
predators on CLM .