It is clear that correct application of antibiotic prophylaxis can reduce the incidence of infection resulting from the bacterial inoculation in a variety of clinical situations; it cannot prevent all infections any more than it can eliminate all established infections. Optimum antibiotic prophylaxis depends on: rational selection of the drug(s), adequate concentrations of the drug in the tissues that are at risk, and attention to timing of administration. Moreover, the risk of infection in some situations does not outweigh the risks which attend the administration of even the safest antibiotic drug. The aim of this study was to compare between 2 prophylactic protocols in out patients undergoing oral surgical procedures. Thirty patients, selected from the attendants of oral surgery clinic in Al-Karamah Dental Center, were subjected to different oral surgical procedures under local anesthesia. These patients were given single dose antibiotic prophylaxis in 2 groups; 1st group were 15 patients given 1 million i.u. of procaine penicillin I.M. 30 minutes before oral surgery, 2nd group were 15 patients given 600mg clindamycin orally 1 hours before oral surgery. The maximum time for all procedures was 2 hours. There was no difference between procaine penicillin (1 million i.u.), and clindamycin (600mg), regimens concerning post operative infection in out patient’s oral surgical procedures. Key words: Antibiotic prophylaxis, outpatient oral surgery
The researchers aim of this research to analyze the reality of educational services in the city of Ramadi in order to reveal the efficiency of the spatial distribution of schools at the level of residential neighborhoods and the requirements of the population, based on the standards and indicators for this service.
The research problem related to the educational function of the city of Ramadi was formulated by asking about the efficiency of the spatial distribution of educational services and whether there is a balance in the distribution of schools to residential neighborhoods in a way that meets the requirements of the population, and in order to answer the research problem, the research hypothesis was formulated that there is
... Show MoreThe research aims to study and assess the effectiveness of preventive measures banking for the reduction of money laundering based on the checklist (Check list), which have been prepared based on the paragraphs of some of the principles and recommendations of international and Money Laundering Act No. 93 of 2004 and the instructions thereto, to examine and assess the application of these measures by Gulf Commercial Bank, which was chosen to perform the search.
I've been a statement the concept of money laundering in terms of the definition and characteristics, stages and effects of political, economic and social as well as the nature of banking supervision in terms of the definition and the most important
... Show MoreThis study examined the problem of identifying the vocabulary of the methodology of teaching Arabic language in the faculties of Media. The researcher noticed the existence of an overlap between the syllabuses of the general specialization of the Arabic language and its Media sections in the universities with the special professional vocabulary that suits the study of the media student. Thus ,this study is regarded as a real attempt to present a methodological model of media language that concerns with fillfuling students ‘linguistic and knowledgeable needs relying on measuring their benefits from the methodological Arabic curriculum . Key words:problem, teaching’ methodology of Arabic language, media language.
... Show MoreThe woman's choice of clothing is no longer supported on the basis of the available forms of design in general. It is the interaction of design relationships with the receiver structure that reflects the character of integrated women with an emphasis on attractions pulling attention, all of these interventions reach us to the need to emphasize through this search Picking the perfect symbols of heritage in every sense of the popular beliefs of the employed in the designs of apparel fabrics women's home included a search of four chapters deal with the first problem of the research which you can employ the traditional symbols and popular beliefs in the designs of household apparel fabrics in order to raise the aesthetic value and utility of
... Show MoreOsmotin and osmotin-like proteins belong to the PR-5 pathogenesis-related group of proteins and are induced in response to various types of biotic and abiotic stresses in several plant species. Carrot was transformed with a tobacco osmotin gene that encodes a protein lacking the vacuolar-sorting motif that is composed of a 20-amino-acid sequence at the C-terminal end, under the control of the cauliflower mosaic virus 35S promoter, using Agrobacterium-mediated transformation. Transgene integration and expression were confirmed by Southern and western blot analyses, and three selected transgenic lines were evaluated for their ability to tolerate drought stress. Under drought stress conditions, all transformants exhibited slower rates of wilti
... Show MoreTo deduct the childhood status in Iraq, it was important manner to use statistical tools and approaches concerned with interpreting the causal relationships and their attitudes and use classification method for the important effects (variables) to draw an obvious picture of the phenomena under study in order to make it useful through investing, updating and improving it in by demographic studies in the future. Two statistical methods had been used in the field of analyzing data of multivariate analysis namely, Cluster Analysis and Factor Analysis.
The present study focuses on four fundamental axes .The nutrition axis, health axis, Educational axis, and the social axis. The study has ca
... Show MoreA fluorescence microscopy considered as a powerful imaging tool in biology and medicine. In addition to useful signal obtained from fluorescence microscopy, there are some defects in its images such as random variation in brightness, noise that caused by photon detection and some background pixels in the acquired fluorescence microscopic images appear wrongly auto-fluorescence property. All these practical limitations have a negative impact on the correct vision and analysis of the fluorescent microscope users. Our research enters the field of automation of image processing and image analysis using image processing techniques and applying this processing and analysis on one of the very important experiments in biology science. This research
... Show MoreField experiment was conducted to test the effect of saline water 2 and7 dSm-1 potassium fertilizer rate 150,300 and 450 kg/donum on nitrogen fixation in Pisum sativum L. nodules. The experiment included anatomy study .Results water salinity ( 2,7 dSm-1) as a main plot and fertilizer rates as a sub plot. Results indicated that irrigation with saline water 7 dSm-¹ caused a significant decrease in N contents especially in the lower parts of the plants. The percentage of the N decreased in lower leaves to (0.01%) under 7dSm-¹ and 300 kg/donum fertilizer; however the percentage increased in the upper leaves to (2.80%) under with 2dSm-¹of irrigation water and 300 kg/ donum fertilizer rate. Fresh weight decreased to 6.26g under 7 dSm
... Show Moreالزكاة فريضة من فرائض الإسلام وعبادة من العبادات التي اقرها الشرع الإسلامي هذه الفريضة المالية التعبدية بالإضافة الى دورها المعنوي الذي يهدف الى إرساء قواعد العدالة الاجتماعية والقضاء على مشكلة الفقر في المجتمع الاسلامي وكما ينص عليها الدين الإسلامي فان لها ابعادها ووظائفها الكثيرة التي تخدم اليات العمل الاقتصادي في مجتمع يعمل وفق نظام اقتصادي أسلامي .
ان انفاق الاموال المتحصلة من فريض
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More