Blood and urine samples were collected from 203 patients to study the relationship between Diabetes mellitus and urinary tract infections (UTI). Blood and urine specimens were subjected for estimation of random blood sugar, in addition to detection of the most pathogen bacteria which cause urinary tract infection in diabetic patients. The study included the detection of bacterial sensitivity to some antibiotics used in treating urinary tract infections, and also included the study of genetic basis which cause both types of diabetes mellitus. The results can be summarized as follows: The incidence of type ? diabetes in males was (35.8%), and (45.9%) in females . and type 2 diabetes in males was (49.6%), while in females was (40.16%).The inc
... Show MoreDry gas is considered one of the most environmentally friendly sources of energy. As a result, developing an efficient strategy for storing this gas has become essential. In this work, MOF-199 was synthesized and characterized in order to investigate the MOF-199 in dry gas adsorption using a built-in volumetric system (methane, ethane, and propane from Basrah gas company). The MOF-199 (metal organic framework) was synthesized using the solvothermal method at 373K for 24h, and then it was characterized. The dry gas adsorption on MOF-199 was studied under various conditions (adsorbent dosage, contact time, temperature, and pressure). The isothermal adsorption of the dry gas had been studied on MOF-199 using two types of mo
... Show MoreDeception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show More
Abstract
What the research come to:
1- The presentation of the image of the proud person in this
mortal life appeared in several styles such as (conversation)
arousing the insert once and convincing in other time,
(confirmation) in all its types، (argument) scolding with the
gradual progress of time of the discourse .Interview and
parallelism are two of these styles with the presences of the
repetition style especially in the topics that has a reference to
the theme of (pride) being implied not directly stated. The
Koran discourse varied in its reference to the theme of pride
according to the context which is mentioned directly
(eighteen times) which formed one third of the number of
Aim: The purpose of this study was to analyze the patterns of facial fractures in children and to compare them between preschool- and school-aged children. Materials and methods: This retrospective observational study included 57 children with facial fractures. The variables analyzed were the age of the patients—divided into a preschool-aged group (0–5 years) and a school-aged group (6–12 years)—gender, cause of trauma, the facial bones involved, the pattern of fracture, the modality of treatment used, the time between injury and treatment, and the postoperative complications. Results: The incidence of facial fractures in children ≤12 years was 30.2%. The patients consisted of 40 (70.2%) males and 17 (29.8%) females, and most pati
... Show MoreBoth of the species Typha domengensis and Phragmites communis among the most important plant endemic in flora of Iraq from monocotyledon. Due to the similarity of the two species with each other in many morphological characteristics such as the environment where they live and the form of leaves and type of leaf venation and type of stomata….ets, also both of species belong to monocots plant therefore this research work was conducted find anatomical differences that have the same as taxonomic value to help distinguishing between both species under study. Through this research, we found great importance to the anatomical characteristics which we reached by studying the roots, stems and leaves sections f
... Show MoreBackground: Helicobacter pylorus is one of the most harmful human pathogens & carcinogen. Of the world's population, more than 50% has H. pylori in their upper gastrointestinal tracts. It has been linked to a variety of extra gastric disorders. In correlation to hepatobiliary diseases; recently, the bacterium has been implicated as a risk factor for various diseases ranging from chronic cholecystitis and primary biliary sclerosing cholangitis to gall bladder cancer and primary hepatic carcinomas. However, the association between Helicobacter pylori (H. pylori) and gallbladder diseases is still vague and is controversial.
Aim of study: To elucidate the association of H pylori and gallbladder diseases (calculu
... Show MoreThe goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤e M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More