Background: Childhood meningitis is a major
cause of morbidity and mortality, Hemophilus
influenza b (Hib) is the most common cause in
many countries, especially below 5 years and
before the development of conjugated Hib vaccine,
it is followed by Streptococcus Pneumonia, and
then N. meningitides, in addition to other
microorganisms.
Objective: To identify the causative organisms
of bacterial meningitis and to identify the factors
predisposing significantly to the incidence of
bacterial meningitis.
Method: This cross sectional , study was done in
Al-Elwia Pediatric Hospital during the period 1st
of January 2007 to 30th of June 2007.Eighty four
patients with presumptive diagnosis of meningitis
were included in this study, from the age of 2
months -12 years, History about some risk factors
were taken in details. Analysis of cerebrospinal
Fluid (CSF) with Gram stains & cultures were
done in all cases.
Results: The number of cases of meningitis was
50 (20 proved meningitis & 30 partially treated
meningitis), while 34 patients are found to have no
meningitis.
Streptococcus pneumoniae was identified in
45%, Hemophilus Influenza b in 20%, while
Nisseria meningitides 5%, other organisms include
Escherichia coli, Staphylococcus aureus,
Klebsiella, & salmonella.
Many factors affecting the occurrence of
bacterial meningitis & these include: age, sex,
residence, body weight and home overcrowding.
Conclusions: Streptococcus pneumoniae was
found to be the predominant microorganism
causing bacterial meningitis in children aged 2
months-12 years, followed by Hemophilus
influenza b, while N. meningitides were one of the
rare bacteria which had been identified. E. coli was
found to be the major cause in cases of ventriculoperitoneal
(VP) shunt meningitis.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis essay aims to highlight the most important issues and difficulties facing implementing large projects that follow the turn-key method, considered one of the types of contractual methods in Iraq, especially for large and complex projects requiring speedy completion. The projects implemented in this way face delays and delays in completion, which led to the lack of benefit from the projects for which they were implemented, especially those affecting the lives of citizens within the health sector. The case study dealt with the construction of hospitals with multi-bed capacities within multiple governorates in Iraq, With large financial allocations within the federal budget of the Government of Iraq over several years.
... Show MoreThe theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
The orbital masses are one of these morphines and functional components that achieve function
The Togolese
The phenomenon of celebration of army leaders in the Abbasid era formed a distinct phenomenon at which the poets stood, and among those leaders was the Arab leader Hamid al-Taie, and the poets who stood on him and his sons Abu Tammam and al-Bohtari recorded in their poems the exploits of that leader, and the exploits of his sons through images that represented sadness, courage In this research, the generosity, and the rhetorical and artistic aspects of those images, have been spotted, balancing the poets.
Organizations nowadays, whether public or private organizations, productive or service (such as banks), face major challenges as a result of rapid and continuous changes, and in front of these challenges traditional management operations and tools become unable to make the organization able to work, which makes it imperative for these organizations to follow the methods and management practices, including the proposed knowledge risk management and strategic direction so that it can elevate its actions at the level of developments in reality, in the sense that these organizations and in the light of environmental developments to characterize their strategic direction as an intellectual approach characterized by mo
... Show MoreThe topic of (pilgrims) of the old and modern subjects at the same time, as it extends his foot and is associated with the beginning of speech and argument, a modern because it is based on studies and research (and the theory of pilgrims) from (Austin and Cyril) through (Charles Breman) to (Aristotle) ), It is worth mentioning here to mention the role of (Hazem al - Qartagni) in mentioning the value of the pilgrimage of hair and saying the use of persuasion in the hair, is palatable and acceptable. Hence our research applied these views, and we chose the pendants as a model for that matter.
The present study is an attempt to show how the three Umayyad poets ; Jarir , Al-
Farazdaq and Al-Akhtal have consciously and skillfully employed in their poetry som ancient
Arab legends ,historical events and wars as they provide atrue image of the values and
customs of the peoples who lived before them .
Their employed , how ever, takes avarying degrees depending, to alarge extent , an the
vast but personal knowledge of each poet the past tradition , and practices . Jarir ,in many
respects out , stands the first , Al-Farazdaq , the second and Al-Akhtal , the third .
The present study is an academic attempt to show how the threeUmayyad poets ; Jarir ,
Al-Farazdaq and Al-Akhtal have skillfully employed old conventions and traditions in their
poetry to serve a dual purpose of making their ideas striking , memorable and compelling and
of reaching eminence as poets.
The primary aim of the poets has been to amuse , convince and influence the readers or
listeners of their poetry . as it were, a mirror image of the social , religious and historical
beliefs , values and customs which prevailed throughout the ages before the emergence.
In this research, we have added nano anatase TiO2 as a partial replacement of Portland cement by a weight percentage of (0.25 to 1%) for the development of properties for protection against bacteria. The control mix was made by using "the cement to sand" proportion about (1: 2.75) with the "water to cement" proportion of (0.5) to study the structure, porosity, water absorption, density, mechanical properties, as well as anti-bacterial behavior. Inspections have been done such as scanning electron microscopy (SEM), and atomic force microscope (AFM) for mortar. Experimental results showed that after the addition of Nano powders in cement mortar, the structural properties improved significantly with the development of hydration o
... Show MoreJournal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology