The Coronavirus Disease 2019 (COVID-19) pandemic has caused an unprecedented disruption in medical education and healthcare systems worldwide. The disease can cause life-threatening conditions and it presents challenges for medical education, as instructors must deliver lectures safely, while ensuring the integrity and continuity of the medical education process. It is therefore important to assess the usability of online learning methods, and to determine their feasibility and adequacy for medical students. We aimed to provide an overview of the situation experienced by medical students during the COVID-19 pandemic, and to determine the knowledge, attitudes, and practices of medical students regarding electronic medical education.
... Show MoreBACKGROUND: SARS-CoV-2 (COVID-19) is considered a highly infectious and life threatening disease. OBJECTIVE: The present paper aims to evaluate various aspects of preventive measures and clinical management of the scheduled visits for orthodontic patients to the dental clinics during the outbreak of COVID-19, and to assess how orthodontists dealt with this challenge. METHODS: Orthodontists in private and public clinics were invited to fill a questionnaire that addressed infection control protocols and concerns about clinical management of patients in the clinics during the pandemic. Frequncies and percentages of the responses were obtained and compared using Chi-square tests. RESULTS: About 77% of those working in private clinics, a
... Show MoreSince the COVID-19 pandemic alarm was made by the severe acute respiratory syndrome (SARS)-coronavirus (CoV) 2, several institutions and agencies have pursued to clarify the viral virulence and infectivity. The fast propagation of this virus leads to an unprecedented rise in the number of cases worldwide. COVID-19 virus is exceptionally contagious that spreads through droplets, respiratory secretions, and direct contact. The enveloped, single-stranded RNA virus has a specific envelop region called (S) region encoding (S protein) that specifically binds to the host cell receptor. Viral infection requires receptors' participation on the host cell membrane's surface, a key- step for the viral invasion of susceptible cells.
Rec
... Show MoreIn this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the c
... Show MoreChurning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show MoreBackground: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric
Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More