This present study demonstrated that liver was involved in 14 %of typhoid patients manifesting with hepatomegaly. Elevation of serum enzymes in typhoid fever was presumably of a muscular origin, while elevation of liver enzyme was relatively less common. This study was performed on 30 female patients diagnosed by ultrasound (US) of abdomen, with paratyphoid A, ranged between (20-40) years compared with 30 healthy control .Patients volunteers were treated with appropriate antibiotics for 14 days and investigations were repeated 2-3 week after completion of treatment. Patients had clinical and biochemical evidence of hepatic dysfunction. The spectrum of hepatic involvement included hepatomegaly , jaundice, derangement of various hepatic functions and abnormal US abdomen. The results revealed a highly significant values increase in serum AST and ALT compared to control was found while a significant increase of serum ALP compared to control was noticed and a significant decrease in serum LDH compared to control was obtained.
This study aimed to identify the degree of frustration and guilt among addicts who hurt themselves with drug, and to know the addicts perspective who are in treatment clinics and rehabilitation centers in Palestine, in order to achieve this goal aDeterminationThe study population has been identified , this study population consisted of ' (82) addict, the researcher used the descriptive analytical method which is appropriate for this study, so the researcher questioned the addicts who are in treatment clinics and rehabilitation centers in Palestine and analyze their responses in light of some of the variables.
The study results showed that drug addicts who ar
... Show MoreBackground: Avascular necrosis (AVN) is defined as cellular death of bone components due to interruption of the blood supply; the bone structures then collapse, resulting in bone destruction, pain, and loss of joint function. AVN is associated with numerous conditions and usually involves the epiphysis of long bones, such as the femoral head. In clinical practice, AVN is most commonly encountered in the hip. Early diagnosis and appropriate intervention can delay the need for joint replacement. However, most patients present late in the disease course. Without treatment, the process is almost always progressive, leading to joint destruction within 5 years.Treatment of a vascular necrosis depends mainly on early diagnosis which mainly base
... Show MoreSummary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead
... Show MoreIn this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water
... Show MoreCompanies seek to enhance investor confidence by achieving the highest level of transparency in disclosure of financial and non-financial information (SASB standards) for Iraqi insurance companies listed on the financial market. The aim of the research is to identify the extent of the ability of financial and non-financial information to enhance transparency in reporting, which is reflected in Investor confidence. And the standards of sustainability development accounting issued by (SASB) through the electronic questionnaire that was distributed. Companies seek to achieve a set of goals, the most important of which is to enhance investor confidence by improving transparency in disclosure. Concerning the employment of financial an
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreThe present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.
Many people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d
... Show MoreThe poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More