الخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في محاولة لتوفير معلومات أساسية حول عدوى Streptococcus ، والمخاطر المحتملة لانتشارها ، واستراتيجيات العلاج والوقاية . النتائج: الطرق الأكثر شيوعًا لانتقال العقديه القيحيه هي من خلال الرذاذ التنفسي ، الآفات الجلدية التي تسببها العقديه القيحيه ملامسة الأشياء أو الأجهزة المصابة. هناك طريقة أخرى محتملة وهي انتقال العدوى عن طريق الغذاء ولكن هناك حاجة إلى مزيد من البحث لتحديد مسار العدوى هذا. تم العثور على المجتمعات الأصلية ، وتلك ذات الوضع الاجتماعي والاقتصادي المنخفض في جميع أنحاء العالم معرضة بشكل خاص لأمراض المكورات العقدية ، وكذلك الأطفال وكبار السن والذين يعانون من ضعف في جهاز المناعة. هذه المجموعات معرضة للإصابة بعدوى العقديه القيحيه ومضاعفاتها مع ارتفاع معدلات العدوى في المؤسسات التعليمية والمستشفيات والازدحام والزيادة المستمرة في الاتصال الاجتماعي. أهمية تحسين الظروف المعيشية والنظافة الشخصية واليدين هي إحدى التقنيات للوقاية من عدوى العقديه القيحيه مع التركيز على طرق مكافحة العدوى بدقة أكبر. الاستنتاج: يجب أن تستهدف تدابير المنع والمكافحةللعدوى بالعقديه القيحيه مع تحسين الظروف المعيشية والنظافة الشخصية غسل اليدين باستمرار ايضا يجب التأكيد على الالتزام بممارسات الوقاية من العدوى ومكافحتها في الاشخاص الذين يملكون ظروف مريضيه عالية الخطورة .
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThis paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.
Experimental results shows LPG-
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreDecision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats.
Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their
... Show MoreLimitations of the conventional diagnostic techniques urged researchers to seek novel methods to predict, diagnose, and monitor periodontal disease. Use of the biomarkers available in oral fluids could be a revolutionary surrogate for the manual probing/diagnostic radiograph. Several salivary biomarkers have the potential to accurately discriminate periodontal health and disease. This study aimed to determine the diagnostic sensitivity and specificity of salivary interleukin (IL)‐17, receptor activator of nuclear factor‐κB ligand (RANKL), osteoprotegerin (OPG), RANKL/OPG for differentiating (1) periodontal health from disease and (2) stable a
Purpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreResearch Summary :
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:
This is a brief research that contained its two rudders the command and its Style in Surat Al-Ma’idah a fundamental rhetorical study, and the study clarified the meaning of imperative in both; the Arabic language and in the terminology of the fundamentalists and rhetoricians in a concise manner, and then indicated the imperative of the command , the true meaning, and the meanings interpretated as an imperative form. I have mentioned some verses of Surat Al-Ma’idah, so what I have quot
... Show More