Background: Prelabour rupture of membranes is a problem that faces the obstetricians. It has many maternal and fetal sequale and its etiology and management still controversial.
Objective: To test the absolute nucleated red blood cells counts at birth in infants who are born after prelabour rupture of membranes.
Methods: A prospective study conducted in AL-Kadhymia Teaching Hospital. Hundred pregnant women were included in this study. Fifty pregnant women who had prelabour rupture of membranes considered as group (1), other fifty pregnant women with intact membranes considered as group (2) through a period of one year. Nucleated red blood cell counts of venous cord blood obtained within one hour of life from 50 infants who were born after prelabour rupture of membranes. The same procedure was applied for the control group.
Results: The nucleated red blood cell counts and Haematocrit were significantly higher in infants who were born after prelabour rupture of membrane than in the control group (P value <0.001 and 0.03 respectively).
Conclusion: Infants born after prelabour rupture of membrane have higher nucleated red blood cell counts at birth than the control group.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreAbstract The strategic performance of the United States depends on dealing with the Middle East countries and its variants on several bases and motives that enabled them to achieve American hegemony and invest its interests at the expense of the region countries. Within this performance, the administration of the United State President Donald Trump presented the Strategic Document on December 18, 2017, which focused on the principle of "America First", to determine the direction of future US strategic performance in the formulation of means of cooperation and intersections or hostility in addition to interests and threats.The future vision of the Arab region and the Middle East as a whole, this strategy is based on the fact that
... Show MoreRock engineers widely use the uniaxial compressive strength (UCS) of rocks in designing
surface and underground structures. The procedure for measuring this rock strength has been
standardized by both the International Society for Rock Mechanics (ISRM) and American Society
for Testing and Materials (ASTM), Akram and Bakar(2007).
In this paper, an experimental study was performed to correlate of Point Load Index ( Is(50))
and Pulse Wave Velocity (Vp) to the Unconfined Compressive Strength (UCS) of Rocks. The effect
of several parameters was studied. Point load test, Unconfined Compressive Strength (UCS) and
Pulse Wave Velocity (Vp) were used for testing several rock samples with different diameters.
The predicted e
The current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o
... Show MoreThis article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and
... Show MoreIn this research, the preparation of bidentate Schiff base was carried out via the condensation reaction of both the salicylaldehyde with 1-phenyl-2,3-dimethyl-4-amino-5-oxo-pyrazole to form the ligand (L). The mentioned ligand was used to prepare complexes with transition metal ions Mn(II), Co(II), Ni(II), Cu(II) and Zn(II). The resulting complexes were separated and characterized by FTIR and UV-Vis spectroscopic technique. Elemental analysis for Carbon, Hydrogen and Nitrogen elements, electronic spectra of the ligand and complexes were obtained, and the magnetic susceptibility tests were also achieved to measure the dipole moments. The molar conductivities were also measured and determination of chlorine content in the complexes and
... Show More