Background:Nocturnal Enuresis is a common problem affecting 20% of five years old children and up to 2% of adolescent and young adult. Although it is a self limiting benign condition, it has social and psychological impact on the child and his family. Many pathophysiological theories had been suggested, but none is confirmed. Hypercalciuria has been suggested to be associated with higher incidence of nocturnal enuresis. Objectives:The aim of our study to test the value of Ca/Cr ratio, on random urine sample, in diagnosing hypercalciuria in enuretic children. Type of study: Cross sectional study.Methods:Forty four enuretic children were enrolled in this study and forty five children without nocturnal enuresis were taken as control group. Results:The prevalence of abnormal Ca/Cr ratio was higher among enuretic children when compared with control group; the result was statistically significant (P. value0.002). Among the enuretic children, higher Ca/ Cr ratio was statisticallyassociated with urinary symptoms, abnormal general urine examination, and positive family history. Nosuch association was found with the gender or frequency of bed wetting per week. Conclusions:the results of this study suggest that hypercalciuria has a significant association with NE, rendering routine screening of hypercalciuria by Ca/Cr ratio on a random urine sample, is reasonable. Furthermore, a large scale studies are needed to confirm the role of low calcium diet, and other measures in treatment of idiopathic hypercalciuria, in the management of enuretic children with abnormal Ca/Cr ratio
Relationship between thyroid dysfunction and periodontal disease has been mediated through an immune response. Cytokines are implicated in the initiation, consequences of immune response and a crucial role in the pathogenesis of thyroid disease, directly target thyroid follicular cells; and in the development and progression of periodontitis. This study aimed to detect cytokines levels which known to be associated with periodontitis in serum and saliva, to test the hypothesis that hypothyroidism influences the levels of biomarkers of periodontitis. Samples were collected from sixty patients with hypothyroid age ranged (20-64) years, thirty of patients were without periodontitis (group I) and 30 with periodontal disease (II); moreover, 30 su
... Show MoreThis research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreThe research aims to identify the definitional framework for accounting violations and audit procedures in accordance with international auditing standards, preparing a proposed audit program to audit violations resulting from the transition to the unified accounting system in the research sample according to the relevant international auditing standards, as the proposed audit program was prepared according to International auditing standards in order to improve the auditor’s procedures in detecting accounting violations when auditing the financial statements of municipal departments. The research concluded the most important recommendations: The necessity of adopting the audit program proposed by the researcher, for the purpose of act
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreThe study sought to highlight the importance of applying the administrative control procedures which play an important role in assessing the performance of the employees of the tax administration and specifically the companies department by setting the standards and objectives of the department on the basis of which in the implementation of its work and identify deviations and errors and find appropriate solutions and evaluate the results according to appropriate solutions, The study of the problem of research, namely the extent to which the tax administration applied to the administrative control procedures in view of its importance in evaluating the performance of its employees and the extent of their application to the legislations an
... Show MoreThe aim of the study is to investigate the extent to which the teachers of Islamic education and their teachers taught the technological innovations in the universities and to test the significance of the differences between the averages of the degree of practice according to the variables: gender, experience, scientific qualification, and educational stage. To achieve these objectives, a questionnaire consisting of (20) (20) teacher and school, teachers of Islamic education in Iraqi universities.
The results indicated that the degree of the practice of Islamic education teachers and their teachers of technological innovations was moderate, and there were statistically significant differences in the variable of
... Show MoreThe research aims to identify banking stress tests, which is one of the modern and important tools in managing banking risks by applying the equations of that tool to the sample. The banking sector considered one of the most vulnerable to sudden and rapid changes in an unstable economic environment, making it more vulnerable. Therefore, it is necessary to establish a special risk management section to reduce the banking risks of the banking business that negatively affect its performance.
The research concluded that there is a direct relationship between stress tests and risk management, as stress tests are an essential tool in risk management. They also considered a unified approach in managing bank risks that helps the bank to
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More