Preferred Language
Articles
/
jkmc-280
A serology conundrum – HIV infection in acute babesiosis infection could merely be a false positive result
...Show More Authors

Babesiosis is a tick-borne disease caused by Babesia microti. We present a case of false positive HIV in the setting of confirmed babesiosis infection. An understanding that patients with babesiosis can have a false positive HIV test result is important in management decisions.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Preparation of nano-microfibers with a different polymers
...Show More Authors

In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.

View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Research Journal Of Pharmacy And Technology
A Review on Film Forming Drug Delivery Systems
...Show More Authors

Conventional dosage forms for topical and transdermal drug delivery have several disadvantages related mainly to its poor skin permeation and patient compliance. Many approaches have been developed to improve these dosage forms. Film forming drug delivery systems represents a recent advancement in this field. It provides improved patient compliance with enhanced skin permeation of drugs. In its simplest form, these consist of a polymeric solution, usually in a supersaturated state, in a suitable solvent. A plasticizer is usually added to improve the flexibility and enhance the tensile strength to the film. It is also possible to control and sustain the drug release from the films by controlling the polymeric content, concentration o

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Cost of human resources from a behavioral perspective
...Show More Authors

Purpose/objective:

1 - To explain the financial impact of the activities and areas of human resources management and the adoption of the methodology for estimating costs on the basis of conduct and statement of how to assess costs and benefits of human resource activities.

2 - Measuring  human capital, and its impact on the financial statements.

 

Design/methodology/approach:

 Concentrated dimensions of the research paper's lack of financial statements prepared by the organizations for information mandated human resource its components of the three (attraction - development

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Historical development of Islamic jurisprudence - Develop a model
...Show More Authors

 

       Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.

Then:

       Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of inf

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Route Educational And Social Science Journal
A POSTMODERNIST READING OF KURT VONNEGUT’S SLAUGHTERHOUSE-FIVE
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Medeniyet Medical Journal
SARS-CoV-2: A Piece of Bad News
...Show More Authors

A shocking third species emerged from a family of coronaviruses (CoV) in late 2019 following viruses causing SARS (Severe Acute Respiratory Syndrome-CoV) in 2003 and MERS (Middle East Respiratory Syndrome-CoV) in 2012; it’s a novel coronavirus now called severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; formerly called 2019-nCoV). First emerging in China, it has spread rapidly across the globe, giving rise to significant social and economic costs and imposing severe strain on healthcare systems. Since many attempts to control viral spread has been futile, the only old practice of containment including city lockdown and social distancing are working to some extent. Unfortunately, specific antiviral drugs and vaccines remain u

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Quranic Words Referring to Lies A Media Study
...Show More Authors

This research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Semantic Exchange A study of rooting the term
...Show More Authors

The term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.

View Publication Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Anal Fissure: Is it becoming a medical disorder?
...Show More Authors

An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored.A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure.Pharmacological s

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref