The neutrophil/ lymphocyte ratio (NLR) and platelet/lymphocyte ratio (PLR) have the potential to be inflammatory markers that reflect the activity of many inflammatory diseases. The aim of this study was to evaluate the NLR and PLR as potential markers of disease activity in patients with ankylosing spondylitis.
The study involved 132 patients with ankylosing spondylitis and 81 healthy controls matched in terms of age and gender. Their sociodemographic data, disease activity scores using the Bath Ankylosing
Lying is considered a dangerous tendency among children if it has become a habit. It results in many social problems, such as child’s loss of confidence, lack of others’ respect to him, and his lack of respect to the desired values of the society, such as honesty and trust. Consequently, he will be led to a deviation when he becomes old; especially if the child’s socially unaccepted behavior has not been directed. The research, thus, aims to examine the causes of lying in the most important stage of children’s life; that is, between (4-6) years. Such an aim helps to know about the individual reasons of lying among males and females from teachers’ perspectives. To meet the objective of the study, a number of (128) children
... Show MoreThe typical test for diagnosis of severe acute respiratory syndrome coronavirus 2 is a reverse transcription-polymerase chain reaction (RT-PCR) technique, but the chest CT scan might play a complementary role at the first detection of Coronavirus Disease 2019 (COVID-19) pneumonia. Objectives: To determine the sensitivity of CT scan on patients with COVID-19 in Al-Najaf, Iraq, and to compare the accuracy of CT scan with that of RT-PCR technique. Material and Method: This is a prospective study. The patients suspicious of having COVID-19 infection and respiratory symptoms were registered. All patients were diagnosed by RT-PCR and chest CT. Diagnostic performance of CT was intended using RT-PCR as the reference sta
... Show MoreThe article approaches the characteristics of Russian literature in the time of Khrushchev or the "thaw" period a very short period of Soviet history, characterized by the easing of the dictatorship of power and relaxation in various areas of people's lives. The interest in the research is focused on the importance of interpreting the family portrait in a short but distinct period in the development of Russian/Soviet literature. The research material is the story of Sholokhov's “The Fate of Man” 1956, the story of Panova “Serioga” 1955, and Abramov’s story “Fatherless” 1961. В статье рассматриваются особенности художественной литературы периода хруще
... Show MoreThe research aims to identify the effect of teaching-learning design based on the constructivism theory on the life skills of middle stage students. The sample consisted of (60) students from one of the middle schools in Baghdad's governorate. The experimental group and control group consisted of 30 students for each group, the research tool was the life skills scale composed of (78) items. The scale proved its validity and reliability, which was found to be (0.85). The results showed a statistically significant difference in life skills between the two groups of research in favor of the experimental group, which studied the educational design according to models of constructivism theory compared to the usual method of teaching.
Acidizing is one of the most used stimulation techniques in the petroleum industry. Several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly in the development of the Mishrif reservoir, including the following: (1) high injection pressures make it difficult to inject acid into the reservoir formation, and (2) only a few acid jobs have been effective in Ahdeb oil wells, while the bulk of the others has been unsuccessful. The significant failure rate of oil well stimulation in this deposit necessitates more investigations. Thus, we carried out this experimental study to systematically investigate the influence of acid treatment on the geomechanical properties of Mi4
... Show MoreIt is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro
... Show MoreThe objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More