For the first time in Iraq, this study was conducted to evaluate the usefulness of Dot.ELISA, for detecting anti - Leishmania donovani antibodies in serum samples from suspected patient (children under 8 years ) with Visceral Leishmaniasis V.L.. Sera from 73 V.L. , 60 Healthy controls, and 57 patient with other parasitic diseases other than V.L. (Amoebiasis, Giardiasis , Toxoplasmosis, Schistosomiasis , Hydatidosis, Ascariasis , Lupus Erythromatosus , Viral Hepatitis, and Cutaneous Leishmaniasis) were examined. Anti Leishmania donovani antibodies detected in 71 out of 73 suspected Visceral Leishmaniasis . Data of this study showed that infection in male group was more than female group. Result of this study revealed a high prevalence of patients with V.L. infection at the age range 1 - 2.9 and 3 - 4.9 years when compared with other range groups (P>0.01). A cross – reaction was found with sera Lupus Erythromatosus, No cross - reaction was found with sera from other disease . Sensitivity was determined as 97.3 %, and Specificity was found to be 95.7% . Positive and Negative the Values Predictive of test were 96% and 97.4% Dot .ELISA is simpler, Serodiagnosis Rapid, sensitive and specific, Its use in respectively. Seeing that of V.L. can be recommended.
The present study devoted to determine the ultimate lateral carrying capacity of piles foundation in contaminated clayey soils and subjected to lateral cyclical loading. Two methods have been used to calculate the lateral carrying capacity of piles foundation; the first one is two-line slopes intersection method (TLSI) and the second method is a modified model of soil degradation. The model proposed by Heerama and then developed by Smith has been modified to take into consideration the effects of heavy loads and soil contamination. The ultimate lateral carrying capacity of single pile and piles group (2×2) driven into samples of contaminated clayey soils have been calculated by using the two methods. Clayey soil samples are contami
... Show MoreResearch summary
Informing means informing and informing, which is conveying information to someone and confirming his narration with it. Accordingly, information is its main content..and it has multiple means, including visual, audio and read, and it has become the dominant role in the process of socialization, and much of what we hear, read, or watch in the media is not devoid of a goal, and expresses that scientifically as “charged with values” ( Value Loaded)..Values that are: the set of beliefs that the individual holds towards things, meanings, and various aspects of activity, which direct his desires and attitudes towards them, and determine for him acceptable and unacceptable behavior, right and wrong, and all of this
... Show MoreThe objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political syste
... Show MoreUndoubtedly, Road Traffic Accidents (RTAs) are a major dilemma in term of mortality and morbidity facing the road users as well as the traffic and road authorities. Since 2002, the population in Iraq has increased by 49 percent and the number of vehicles by three folds. Consequently, these increases were unfortunately combined with rising the RTAs number, mortality and morbidity. Alongside the humanitarian tragedies, every year, there are considerable economic losses in Iraq lost due to the epidemic of RTAs. Given the necessity of understanding the contributory factors related to RTAs for the implementation by traffic and road authorities to improve the road safety, the necessity have been a rise for
... Show MoreThoudy sustainable development attention of researchers and scholars at various orientations intellectual economies were or Ssayasn, or others as gaining the process of paramount importance in the light of major developments and unprecedented in the modern world at the levels of all and which turned the world sprawling into something like a global village is small, being aimed at elimination of backwardness and development branches of the national economy and raise the level of economic performance, and what was the province of Kurdistan-Iraq from areas with privacy clear and meets the elements of economic development has seen the movement of economic development and social with special features de facto geographical, political a
... Show MoreThe products of the surrealist school since its inception to this day have greatly influenced art in the world, so we find many artists around the world invested in their visual texts the forms generated by surrealism, and here the researcher raises several questions: What are the formal vocabulary that directly or indirectly refers to Self-used by the surrealist painter? Was the surrealist form understood as intended by the movement? In these questions, the research problem is summarized. The importance of it lies in identifying the references to the form of the human self, which are related to the psychological field in the works of the surrealists, especially Salvador Dali. Then the researcher chose his research community from the wor
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More