Background: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 151
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pasteur Institute) .Data pertaining to victims was collected from the registered monthly reports from January 1, 2006 and December31, 2010.
Results: The total number of registered dog bite victims per 5 years of the study was equal to 26795. The studied epidemiological characteristics showed highly significant differences towards male victims with monthly mean number (60.381), the age group (15-45) years as people at risk with monthly mean number (95.167) , the highest total number of registered dog bite victims during the year (2009), with a monthly mean number (56.056), also there was an evident increase in the number of dog bite attacks during the warm months (May and June) with a monthly mean number ( 50.82) Conclusion: The persistence of dog bite as public health problem in Baghdad city.
In this study, the turbulent buoyancy driven fluid flow and heat transfer in a differentially heated rectangular enclosure filled with water is quantified numerically. The two dimensional governing differential equations are discretized using the finite volume method. SIMPLE algorithm is employed to obtain stabilized solution for high Rayleigh numbers by a computational code written in FORTRAN language. A parametric study is undertaken and the effect of Rayleigh numbers (1010 to 1014), the aspect ratio (30, 40 and 50), and the tilt angle (10o to 170o ) on fluid flow and heat transfer are investigated. The results of the adopted model in the present work is compared with previously published results and a qualitative agreement and a good
... Show MoreThank God also taught us that thanks . thank meets the blessings and rewards mazidk glory we have no knowledge except what you have taught you Alim hakim , not counted praise you as yourself praised and pray and to recognize the envoy mercy to the worlds , prophet Mohammed and his family and companions and guided to the day of judgment .
But after :
Aware of the interpretation of the most important science needed by Muslims because God Almighty sent down the Quraan to be a way of the life for Muslims is subject to a healing for what is in the breasts and it slaham and flaham and has spared the nation from crisisThe stats of the monks , like other verses talking about Christians and Jews and what they have invented in the religion o
This study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern h
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show Morecontent Analysis for Some Type of Pillows used in Iraqi houses
Nine Iraqi varieties of barley (Hordeum vulgare L.) has been differentiated and diagnosed using simple sequence repeat markers to detect their genetic polymorphism. Six SSR primers were used for genetic screening of barley samples (IPA 265, IPA 99, Tuwaitha, Hitra, Rayhan, Shuaa, Bawadi, Samir and Al_khair). These primers generated total PCR product (11) bands divided to 8 polymorphic bands 3 monomorphic bands. the percentage of polymorphism 80% ranged between (50-100%). a mean value of polymorphic band per primer was 1.6 . these primers produced amplification fragment at Molecular weight between 75-900 bp. One unique band was generated at size 200bp, this band can be used as a DNA profiling of all studied genotypes. These results appear
... Show More