Background: Mycoplasma pneumoniae (M. pneumoniae) is an important respiratory bacterial pathogen, especially among children. It causes acute upper and lower respiratory infections.Objective: This study was aimed to measure anti- M. pneumoniae antibodies among hospitalized children who were admitted to hospital diagnosed with acute respiratory tract infections.Method: Automated ELISA technique was performed to detect anti- M. pneumoniae antibodies (IgM and IgG antibodies) in serum from 108 children less than 5 years old. The children were admitted to the Pediatric Teaching Hospital in Suleimani city/Kurdistan Region/Iraq because of acute respiratory tract infections. A questionnaire was designed to collect demographic and clinical data from those children.Results: IgM anti- M. pneumoniae antibodies were positive in 15 (13.9%) out of 108 children. The highest seroprevalence was found in the age group 25-36 months while the lowest is in the age group 1-12 months. M. pneumoniae infections were more common among males than females though results were statistically not significant, and attendance of kindergarten or nursery, residency, history of chronic diseases, history of contact with similar conditions, and family history of chronic diseases, they were all statistically not significant. The IgMseropositive children were suffering from bronchitis, croup, pneumonia, or other respiratory infections, in frequencies of 7 (46.6%), 4 (26.7%), 3 (20%), and 1 (6.7%) respectively. Increased erythrocyte sedimentation rate, diagnosis of croup, and diagnosis of bronchitis were more frequent in M. pneumoniae infected group and the results were statistically significant. The IgG anti- M. pneumoniae antibodies were positive in 31 (28.8%) out of the 108 children, and the greatest IgG seroprevalence was highest in age group 49-60 months.Conclusion: M. pneumoniae is an important respiratorypathogen among hospitalized children in Sulaimanigovernorate/Kurdistan/Iraq, and nearly one third of childrenhad experienced M. pneumoniae infection by the age of fiveyears
Background: Bone regeneration in dehiscence and fenestration defect can be improved with the use of platelet rich fibrin (PRF) that provides a scaffold for new bone regeneration. This study was conducted to assess the effectiveness of PRF as a graft material and membrane in dehiscence and fenestration defects. Materials and Methods: This prospective clinical study included patients who received dental implants that demonstrated peri-implant defects which were augmented using Leukocyte- PRF (L-PRF) or Advanced-PRF (A-PRF). Twenty four weeks postoperatively the defect resolution and the density of regenerated bone were assessed by CBCT and re-entry surgery. The assessment also included measurement of primary and secondary implant stability
... Show MoreCopper (I) complex containing folic acid ligand was prepared and characterized on the basis of metal analyses, UV-VIS, FTIR spectroscopies and magnetic susceptibility. The density functional theory (DFT) as molecular modeling calculations was used to determine the donor atoms of folic acid ligand which appear clearly at oxygen atoms binding to hydrogen. Detection of donation sights is supported by theoretical parameters such as geometry, mulliken population, mulliken charge and HOMO-LUMO gap obtained by DFT calculations.
Primary hypogonadism combined with Müllerian hypoplasia and partial alopecia are common features of this syndrome, which was reported only in four earlier families from areas where consanguineous marriage is prevalent. An autosomal recessive pattern of inheritance was suggested earlier and is supported by this report.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThis study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph