Abstract A descriptive study using evaluation technique was carried at the health organizations concerning STIs/HIV/AIDS, mainly the AIDS Researches and Studies Center in Baghdad and many of the AIDS sections in the Health Directorates in the Governorates throughout the period of May 15th , 2003 through September 30th, 2003( to describe the surveillance system for the period 1993 through 2002). The study aimed to describe the STIs/HIV/AIDS surveillance system in Iraq. System evaluation questionnaire was adopted from WHO and developed for the purpose of this study. Content validity of questionnaire was established through a panel of 12 experts. Interobservor reliability method was carried out by two researchers to establish the reliability of the instrument and Cronbach’s alpha coefficient was computed for such reliability as (0.93). Data were collected through two ways, firstly from the documented information which was available in the health organizations concerning STIs/HIV/AIDS surveillance activities and secondly from the direct interview that was carried out with the health workers who are involved in the surveillance system. The data were analyzed through the application of descriptive statistical analysis (frequency and percentage). The study reveals that the activities of the surveillance system are covering all over the country through its distributed health facilities. The surveillance system is focusing on capture, control and prevent transmission of Syphilis, HIV and AIDS as a health events of devastating consequences on the patient and community. Also it succeeds in identification and coverage of the risk groups. National regulation notification of new HIV+ve case is very rapid to control the case and to protect the community . Control measures are so effective in preventing the transmission of these diseases. Three levels (Peripheral , Intermediate and Central) are identified to conduct the surveillance activities all over the country, through which special schedule of time is depending in reporting the information . Feedback among these levels is taking the forms of sessions, seminars for the staff involved in the surveillance, the community and field visits to the sentinel sites. The study recommended that high technical communication means may be depended in reporting . Lastly, surveillance is to be included as a subject in the curriculum of the Community Health Nursing as well as for Community Medicine for undergraduate and post-graduate students.
. This rtsearch involveda a study of the relationship
between GPS coordinates and planimetry coordinates. It was found that there is a relation between GPS output coordinates and
the coordinates of a distance point from the positi on of the GPS point
. In order to pricist the direction of distance a reference point had been
used which is
( Greenwich Mean observatory) GMO.
The angles between the studying
... Show MoreThis research aims to determine the role of employee performance evaluation of the achievement of the quality of human resources in the Office of the Inspector General / Martyrs Foundation requirements by employing comparison steps reference with the Office of the Inspector General / Ministry of Higher Education and Scientific Research, has been touching the researchers need the Office of the Inspector General / Martyrs Foundation to apply assess the performance is good for workers and the employment of its outputs to achieve the requirements of the above-mentioned system, and in order to stand on this role we raised the following question President: (is the quality of human resources requirements are achieved through the employm
... Show MoreA field experiment was conducted during the spring season 2020 in Karbala proving/ Al-Sharia Distrit, located at latitude N 32° 42' 13.8" and longitude E 43° 54' 36.6" and at an altitude of 27 m above sea level. The experiment included a study of two factors: the first, Irrigation Interval, three treatments were used: irrigation treatment every 2 days, Irrigation treatment every 4 days, and Irrigation treatment every 6 days. The second factor is the addition of soil conditioners, in which four treatments were used: the control treatment without any addition, the treatment of adding bio-organic fertilizers, the treatment of adding water-conserving technology (polymer), and the treatment of adding water-conserving technology + fertilizers O
... Show MorePathological blood clot in blood vessels, which often leads to cardiovascular diseases, are one of the most common causes of death in humans. Therefore, enzymatic therapy to degrade blood clots is vital. To achieve this goal, bromelain was immobilized and used for the biodegradation of blood clots. Bromelain was extracted from the pineapple fruit pulp (Ananas comosus) and purified by ion exchange chromatography after precipitation with ammonium sulphate (0-80 %), resulting in a yield of 70%, purification fold of 1.42, and a specific activity of 1175 U/mg. Bromelain was covalently immobilized on functionalized multi-walled carbon nanotubes (MWCNT), with an enzyme loading of 71.35%. The results of the characterization of free and immobilized
... Show MoreThe need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More