Demodex species are external parasites; they are transmitted via direct contact, and when present in elevated numbers it may induce several ocular diseases. However, the symptoms are very similar to other diseases; hence, its’ role is often neglected. Therefore, an accurate diagnosis is important in order to avoid mistreatment. In this study, infestation rates in both blepharitis and chalazia were compared to an asymptomatic group, with relation to gender, age, personal hygiene, time of year, and residency. All specimens were examined immediately after collection. The aim of this study was to investigate the relationship between Demodex mites and ocular diseases. These mites were predominantly found in patients with chalazia (62.50%) followed by blepharitis (58.91%), while they were only observed in (22.64%) of asymptomatic patients, statistical analysis showed a significant relationship between infestation and both ocular diseases (P<0.01). The infestation rates increased significantly with age reaching (100%) in patients above 70 years old, and especially during cold months with high humidity. These mites were also found in rural areas (57.59%), followed by urban areas (44.09%) and a significant relationship was found between residency and infestation rate (P≤0.05). However, no significant relationship was found according to gender nor personal hygiene.
A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreThe mineralogical study using X-ray diffraction (XRD) supported by scanning electron microscopic (SEM) examination and energy-dispersive spectroscopy (EDS) on the claystone of the Kolosh Formation from northern Iraq was conducted to Shows the provenance history of rocks. Chlorite, montmorillonite, illite, palygorskite, and kaolinite were recorded in different amounts in the study area. The association of montmorillonite and chlorite in the claystone of the Kolosh Formation (Paleocene) refers to the marine environment. Chlorite and montmorillonite are the common minerals in the Kolosh Formation with less common of illite, kaolinite and palygorskite. These clay minerals are of authigenic, detrital and diagenetically origin, which
... Show MoreAl-Salhubia, area is located within the arid region in southern Iraq. Although no surface water is available in this area, the groundwater is considered the basis in the area, it is available in both good quality and quantity. For that reason, it is of prime importance to examine water type in the unconfined aquifer to determine suitability of groundwater for irrigation purposes. The groundwater type in the studied area is Ca-Mg dominant SO4 facies according to Piper and Stiff diagrams. Based on SAR, Na%, RSC, EC, and PI, the groundwater quality in the study area is suitable for irrigation in general.
In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreEach sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreThe kindergarten teacher play a role in fixing the children behavior so she must plant the value and the habits that make a positive behavior and accepted by the society so the teacher must know all the right educational psychological styles to fix the children behavior and make them accepted psychologically and socially so the problem of the research start from knowing the relation between the methods of dealing with the kindergarten’s teachers and the non right behavior appearance for the kindergarten children. The current research aims to measure the negative behavior appearance of the children of kindergarten and distinguish it according to (sex and levels) and to distinguish the most using styles by the teachers of kinderg
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
This paper is based on the Sentinel-2 satellite data: the thermal, red, and NIR bands. The Babylon city was chosen in this study for different reasons: its location in the middle of Iraq and it represents the largest capitals of the Mesopotamia civilization in the word. The Land Surface Temperature (LST) was determined using a method that incorporates remote sensing, geographic information systems, and statistics. This process has made it possible to monitor the relationship between land usage and the land surface temperature for four seasons in the year 2021. The mapswere processed and analyzed by using ArcGIS software. Five maps of the LST were constructed. Each map represents diffe