Preferred Language
Articles
/
jkmc-759
Bacterial Infections Associated with Cutaneous Leishmaniasis
...Show More Authors

Background:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients with cutaneous
leishmaniasis. Skin specimens were taken for
bacteriological and parasitological investigations .The same
thing was done for specimens from 25 intact individuals
resembling the test group as negative controls.
Results: Children showed more lesions with Positive
cutaneous leishmaniasis, adult females, showed more l
lesions than adult males. Children showed more bacterial
isolates than adults, from both positive and negative l
lesions. Staphylococcal and Streptococcal isolates took the
first rank of isolation in all age groups and both sexes. E.
coli and fecal Streptococci were isolated from children
only.
Conclusion: Bacterial invasion for the skin lesion with
cutaneous leishmaniasis complicates the lesion and leads to
misdiagnosis, in addition to the delay of healing of the
lesion via bacterial end-products. There is a need for
accurate diagnostic techniques like polymerase chain
reaction (PCR) for both bacterial and parasitic agents,
suitable effective antimicrobial therapy, in addition to the
antileishmanial agents. Good sanitation of the lesion and
community education to prevent infections

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Rough continuity and rough separation axioms in G<inf>m</inf>-closure approximation spaces
...Show More Authors

The theory of general topology view for continuous mappings is general version and is applied for topological graph theory. Separation axioms can be regard as tools for distinguishing objects in information systems. Rough theory is one of map the topology to uncertainty. The aim of this work is to presented graph, continuity, separation properties and rough set to put a new approaches for uncertainty. For the introduce of various levels of approximations, we introduce several levels of continuity and separation axioms on graphs in Gm-closure approximation spaces.

Preview PDF
Scopus Clarivate
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Efficient Single Stage Shrinkage Estimator for the Scale parameter of Inverted Gamma Distribution
...Show More Authors

 The present  paper agrees  with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using  suitable  shrinkage weight factor and region.  The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator  are performed .The results are presented in attached tables.

View Publication Preview PDF
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Improvement the Mechanical Characteristics of Alloy Steel DIN 41Cr4 by Shot Peening
...Show More Authors

The effects of shot peening treatment (SPT) were studied at (10,20, and 30) minutes on the rotating bending fatigue behavior and the behavior of the alloy steel DIN 41Cr4 vibrations. The hardness test, tensile test, constant amplitude fatigue tests, and the vibration measurements were performed on samples with and without cracks at room temperature (RT), also, the fracture surface was examined and analyzed by a Scanning Electron Microscope (SEM). The results of the investigations, for example, Stress to Number of cycles to failure (S-N) curves, fatigue strength improvement factor of 5% to 10%, the decreasing percentage of maximum Fast Fourier Transform (FFT) acceleration of the shot-peened condition were compared to untr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Fully Prime Semimodule, Fully Essential Semimodule and Semi-Complement Subsemimodules
...Show More Authors

      The concept of semi-essential semimodule has been studied by many researchers.

     In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule  is prime, then  is fully prime. If every semi-essential subsemimodule of -semimodule  is essential then  is fully essential. Finally, a prime subsemimodule  of  is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule  in , if , and whenever  with  is a prime subsemimodule in , , then .  Furthermore, some res

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Nearly Pseudo Quasi-2-Absorbing submodules(I)
...Show More Authors

The concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Some Geometric Properties for a Certain Class of Meromorphic Univalent Functions by Differential Operator
...Show More Authors

The major target of this paper is to study a confirmed class of meromorphic univalent functions . We procure several results, such as those related to coefficient estimates, distortion and growth theorem, radii of starlikeness, and convexity for this class, n additionto hadamard product, convex combination, closure theorem, integral operators, and  neighborhoods.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Investigation of Pomegranate Peel and Grape Seed Powder Additives on the Rheological and Filtration Properties of Un-Weighted WBM
...Show More Authors

   The chemical additives used to enhance the properties of drilling mud cause damage to humans and the environment. Therefore, it is necessary to search for alternative additives to add them to the drilling mud. Thus, this study investigates the effects of pomegranate peel and grape seed powders as natural waste when added to un-weighted water-based mud. The test includes measurements of the rheological properties and filtration, as well as the alkanity and density of the drilling mud. The results showed a decrease in PH values ​​with an increase in the concentrations of pomegranate peel or grapeseed, and a decrease in mud density with an increase in powders of pomegranate peel and grape seed concentrations that resulted f

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Engineering
Application of Water Quality Index and Water Suitability for Drinking of the Euphrates River within Al-Anbar Province, Iraq.
...Show More Authors

In this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, which are useful in water quality management and decision making. The application of Water Quality Index (WQI) with ten physicochemical water quality parameters was performed to evaluate the quality of Euphrates River water for drinking usage. This was done by subjecting the water samples collected from seven stations within Al-Anbar province during the period 2004-2010 to comprehensive physicochemical analysis. The ten physicochemical parame

... Show More