60 patients diagnosed as having urticaria were included in the study ; 30 patients were effected with acute urticaria and 30 patients were affected with chronic urticaria. In addition, 30 healthy adult volunteers were selected as control group .The patients and control groups sera were examined with enzyme linked immunosorbent assay ( ELISA) to detect total level IgE and radial immunodiffusion (RID) to detect levels of IgG , IgA and IgM . The total level of IgE in acute urticaria ( 1.45±0.13) IU/mL and chronic urticaria (2.12 ± 0.10) IU/mL patients were significantly higher than the control groups ( 0.85 ± 0.10)IU/mL (p<0.05). The level of IgG in acute urticaria ( 12.5± 0.42) g/L and chronic (13.16±0.40) g/L patients , IgA in acute (2.
... Show MoreThe problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a
A numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw
... Show MoreDrawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show MoreThis research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analyt
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe lower Cretaceous sandstones of Zubair and Nahr Umr formations are the main producing reservoirs in Subba oilfield in southern Iraq. Key differences in their petrophysical and depositional attributes exist affecting their reservoir characteristics. The evaluation of well logs and core porosity-permeability data show better reservoir properties in Nahr Formation. The Litho-saturation logs indicate greater thickness of oil-saturated reservoir units for Nahr Unr Formation associated with lower values of shale volume, and higher values of effective porosity. In addition, higher values of permeability for Nahr Umr Formation is suggested by applying porosity-irreducible water saturation cross plot. The reducing reservoir quality of Zub
... Show More