Preferred Language
Articles
/
jkmc-197
Spectrum of central nervous system infections in neurosciences hospital in two years : a retrospective study
...Show More Authors

Background :Infectious disorders in general have high morbidity and mortality.. CNS infections include many disorders like bacterial meningitis, tuberculous and other subacute and chronic meningitis, viral meningitis, cerebral abscess, spinal cord infections, and others.
Objective: To assess our locality about prevalence of CNS infections , to have more awareness regarding CNS infections, and to try to find the proper way to reduce their prevalence and to treat them in appropriate way.
Method :We revised the records of all the cases of CNS infections excluding cases of spinal cord infections who were admitted in the wards of neuroscience hospital over the previous two years ( from July/2010 to June 2012 ),those were 132 cases.Seasonal incidenceand other clinical aspects and other parameters like age , sex, , fever are extracted and recorded
Results: The most common CNS infections in sequence from the most to the least were bacterial meningitis, viral encephalitis, tuberculous meningitis, viral meningitis, and cerebral abscess.
The most common age group which is affected by CNS infections was below 10 years.
Males are affected more than females taking in consideration all types of infection.
P values were statistically significant for age, fever, signs of meningeal irritation, focal neurological deficit, and seizures.
Conclusion : The total rate of admission of CNS infections in our series was lower than other study.
The most frequent type of CNS infections was bacterial meningitis which is the same as most of the studies.
Males are affected more than females in our study in all types of CNS infections, this was approximate to other studies except for tuberculous meningitis.
Bacterial meningitis and viral encephalitis were more common in preschool children in our study.
Fever rate in bacterial and tuberculous meningitis was different from other studies.
Seizure rate in bacterial meningitis and viral encephalitis was approximate to other results.
Rate of focal deficit in viral encephalitis and tuberculous meningitis was different from other studies.
Rate of CSF protein elevation in all CNS infections was approximate to other studies.
Rate of hypoglycorrhachia was different from other studies only in tuberculous meningitis.
CSF pleocytosis was approximate to other studies in all types of CNS infections.
The two most common types of CNS infections , bacterial meningitis and viral encephalitis, are more common in preschool age groups.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Parasitology International
Genetic polymorphism of Baylisascaris procyonis in host infrapopulations and component populations in the Central USA
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Study of the Singlet and the Triplet States of Two ElectronSystems in the First Excited State
...Show More Authors

A study of the singlet and triplet states of two electron systems in the first excited state was performed using a simple quantum mechanical model, which assigns the 1s,and 2s orbital with two different variational parameters. Our results agree with a high level calculation used by Snow and Bills.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 18 2018
Journal Name
Mustansiria Dental Journal
The Effect of Pepsi Cola Beverage on Surface Roughness of Two Composite Resins (In Vitro study)
...Show More Authors

An acidic environment causes surface changes of resin composites. Filler particlesize and filler distribution also have a direct effect on these surface changes. This invitro study evaluated the influence of Pepsi Cola drink on the surface roughness ofComposan LCM and Composan Ceram over time. Sixteen disc shaped specimens(10mm diameter, 2mm thickness) of each resin composite were fabricated, therebyforming two groups (n= 8). Surface roughness (Ra) was analyzed after 24 hrs beforeexposure to beverage. The specimens were submitted to a five minutes immersion inPepsi Cola three times daily interrupted by immersion in deionized distilled water (37C˚). Surface roughness measurements were done at 10, 30, and 60 days intervals. Datawere

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Applying Social Stories in Developing Social Interaction Skills among Children with Autism Spectrum Disorder
...Show More Authors

Abstract

The current research aims to identify the effectiveness of social stories in increasing social interaction among children with an autism spectrum disorder. The researcher used the single-subject design methodology (Single Subject Designs, SSD) with

 (A-B) design to answer the research questions. The study sample consisted of (3) children with autism spectrum disorder enrolled in a transit daycare center in the Asir region, Saudi Arabia. The results of the study showed that there is a positive functional relationship between social stories and play to increase social interaction among children with autism spectrum disorder, which contributed to the acquisition and generalization of this behav

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Comparative Study between the Behavior of the Concrete Thrust Block and the Restraint Joint in a Water Distribution System; Review
...Show More Authors

Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
A Comparative Efficiency Study of Two Adsorbent Materials to Remove Eosin Y Dye from Aqueous Solutions
...Show More Authors

This study was done to find a cheap, available and ecofriendly materials that can remove eosin y dye from aqueous solutions by adsorption in this study, two adsorbent materials were used, the shells of fresh water clam (Cabicula fluminea) and walnut shells. To make a comparison between the two adsorbents, five experiments were conducted. First, the effects of the contact time, here the nut shell removed the dye quickly, while the C. flumina need more contact time to remove the dye. Second, the effects of adsorbent weight were examined. The nut shell was very promising and for all used adsorbent weight, the R% ranged from 94.87 to 99.29. However C. fluminea was less effective in removing the dye with R% ranged from 47.59 to 55.39. The thi

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Favism Clinical Experience in Al-Elwia Pediatric Teaching Hospital in Iraq
...Show More Authors

Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref