Hepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative random sample of households. A stratified random sample proportional to size of each of the 18 Iraqi governorates, both urban and rural areas was employed. Blood samples were taken from study subjects. The relative frequency of positive anti-HAV IgM antibodies was 41.0%, while anti- HEV IgM represented 19.4 % of patients with a clinical suspicion of acute viral hepatitis. The prevalence of hepatitis A-IgG antibodies in Iraqi population is 96.4% (95% confidence interval is 96-96.8%), while that of Hepatitis E-IgG antibodies was 20.3 % (95% confidence interval is 19.4-21.2%). The sero-prevalence showed a steady and significant increase with age for hepatitis E, while it showed an obvious increase between the first and second decade of life for HAV. No significant sex variation was observed for HAV, while males had a higher risk (by 15%) for HEV. The after war situation in Iraq is disastrous, due to the damage to water supply infrastructure and its contamination with sewage, Hepatitis A is hyper endemic in Iraq, while hepatitis E is endemic. Among patients with a clinical diagnosis of acute viral hepatitis, two fifths had serologic evidence of type A and another one fifth had type E viral hepatitis
The Paleocene benthic foraminiferal zonation of the Umm Er Rhadhuma Formation from the borehole (K.H 12/7), South Anah City (Western Iraq), has been re-studied and re-analyzed precisely based on the large benthic foraminifera (LBF). They are represented by two biozone Rotorbinella hensoni Partial Range Zone, recorded from the Lower and middle parts of the Umm Er Rhadhuma Formation and Lockhartia praehaimei Partial Range Zone determined Uppermost of this unit, and dated to be the Selandian – Thanetian stage. Almost all the biogenic (micro and macro) and non-biogenic constituents, including large benthic foraminifera, Algae, Echinoderm, Bryozoans, Oyster, Gastropod fragments, and peloids, in addition to lithofacies types, indicate t
... Show MoreThe nigra scale, Parasaissetia nigra (Nietner, 1861) (Hemiptera, Coccidae) recorded as a new insect pest attacking fig trees, Ficus carica (Moraceae) in Iraq. It was observed during April 2014 in residential garden at Al-Hurriyah district in Baghdad.
Rainfall in Nigeria is highly dynamic and variable on a temporal and spatial scale. This has taken a more pronounced dimension due to climate change. In this study, Standard Precipitation Index (SPI) and Mann-Kendall test statistical tools were employed to analyze rainfall trends and patterns in Gombe metropolis between 1990 and 2020 and the ARIMA model was used for making the forecast for ten (10) years. Daily rainfall data of 31 years obtained from Nigerian Meteorological Agency, (NIMET) was used for the study. The daily rainfall data was subjected to several analyses. Standard precipitation index showed that alternation of wet and dry period conditions had been witnessed in the study area. The result obtained showed that there is an u
... Show MoreThe open hole well log data (Resistivity, Sonic, and Gamma Ray) of well X in Euphrates subzone within the Mesopotamian basin are applied to detect the total organic carbon (TOC) of Zubair Formation in the south part of Iraq. The mathematical interpretation of the logs parameters helped in detecting the TOC and source rock productivity. As well, the quantitative interpretation of the logs data leads to assigning to the organic content and source rock intervals identification. The reactions of logs in relation to the increasing of TOC can be detected through logs parameters. By this way, the TOC can be predicted with an increase in gamma-ray, sonic, neutron, and resistivity, as well as a decrease in the density log
... Show MoreVoice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator
... Show MoreIn this paper, the discriminant analysis is used to classify the most wide spread heart diseases known as coronary heart diseases into two groups (patient, not patient) based on the changes of discrimination features of ten predictor variables that we believe they cause the disease . A random sample for each group is employed and the stepwise procedures are performed in order to delete those variables that are not important for separating the groups. Tests of significance of discriminant analysis and estimating the misclassification rates are performed
Over the years, the field of Medical Imagology has gained considerable importance. The number of neuroimaging studies conducted using functional magnetic resonance imaging (fMRI) has been exploding in recent years. fMRI survey gives to rise to large amounts of noisy data with a complex spatiotemporal correlation structure. Statistics play great role in clarifying the features of the data and gain results that can be used and explain by neuroscientists. Several types of artifacts can happen through a functional magnetic resonance imaging (fMRI) scanner Because of software or hardware problems, physical limitation or human physiologic phenomenon. Several of them can negatively affect di
In this paper, we applied the concept of the error analysis using the linearization method and new condition numbers constituting optimal bounds in appraisals of the possible errors. Evaluations of finite continued fractions, computations of determinates of tridiagonal systems, of determinates of second order and a "fast" complex multiplication. As in Horner's scheme, present rounding error analysis of product and summation algorithms. The error estimates are tested by numerical examples. The executed program for calculation is "MATLAB 7" from the website "Mathworks.com
A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More