الخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في محاولة لتوفير معلومات أساسية حول عدوى Streptococcus ، والمخاطر المحتملة لانتشارها ، واستراتيجيات العلاج والوقاية . النتائج: الطرق الأكثر شيوعًا لانتقال العقديه القيحيه هي من خلال الرذاذ التنفسي ، الآفات الجلدية التي تسببها العقديه القيحيه ملامسة الأشياء أو الأجهزة المصابة. هناك طريقة أخرى محتملة وهي انتقال العدوى عن طريق الغذاء ولكن هناك حاجة إلى مزيد من البحث لتحديد مسار العدوى هذا. تم العثور على المجتمعات الأصلية ، وتلك ذات الوضع الاجتماعي والاقتصادي المنخفض في جميع أنحاء العالم معرضة بشكل خاص لأمراض المكورات العقدية ، وكذلك الأطفال وكبار السن والذين يعانون من ضعف في جهاز المناعة. هذه المجموعات معرضة للإصابة بعدوى العقديه القيحيه ومضاعفاتها مع ارتفاع معدلات العدوى في المؤسسات التعليمية والمستشفيات والازدحام والزيادة المستمرة في الاتصال الاجتماعي. أهمية تحسين الظروف المعيشية والنظافة الشخصية واليدين هي إحدى التقنيات للوقاية من عدوى العقديه القيحيه مع التركيز على طرق مكافحة العدوى بدقة أكبر. الاستنتاج: يجب أن تستهدف تدابير المنع والمكافحةللعدوى بالعقديه القيحيه مع تحسين الظروف المعيشية والنظافة الشخصية غسل اليدين باستمرار ايضا يجب التأكيد على الالتزام بممارسات الوقاية من العدوى ومكافحتها في الاشخاص الذين يملكون ظروف مريضيه عالية الخطورة .
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreTo create a highly efficient photovoltaic-thermal (PV-T) system and maximise the energy and exergy efficiency, this study aims to propose an innovative configuration of a PV-T system comprising wavy tubes with twisted-tape inserts. Following the validation of a numerical model, a parametric study has been conducted to assess the geometrical effects of twisted tape and wavy tubes, as well as the coolant fluid type and velocity, on the overall performance of a PV-T system, located in Shiraz, Iran. It is found that employing twisted tape improves the energy and exergy efficiency by approx. 6.3%. The best configuration yields 12.4% and 16.8% increase in energy and exergy efficiency compared to conventional PV systems. This is achieved at 15% vo
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show MoreIn this research, we introduce and study the concept of fibrewise bitopological spaces. We generalize some fundamental results from fibrewise topology into fibrewise bitopological space. We also introduce the concepts of fibrewise closed bitopological spaces,(resp., open, locally sliceable and locally sectionable). We state and prove several propositions concerning with these concepts. On the other hand, we extend separation axioms of ordinary bitopology into fibrewise setting. The separation axioms we extend are called fibrewise pairwise T_0 spaces, fibrewise pairwise T_1 spaces, fibrewise pairwise R_0 spaces, fibrewise pairwise Hausdorff spaces, fibrewise pairwise functionally Hausdorff spaces, fibrewise pairwise regular spaces, fibrewise
... Show Morewhich is much useful in the Arabic Language generally in the Holly Quran especially. It is the pronoun I have taken in the semantic aspect from it and I have done on the surra sabba which varities the semantical pronoun in it among the pronoun of the speaker the conscience of the addressee the absent such the the siprat pronoun that comes in it with the explanation for its importance and its work and this is the subject of the first unit which I advanced it from the concept of the pronoun Linguistically and convention. After that I have lighten in some meanings which I have done in the surrat as a semantic , magnification , proud, reprimand and others which I ended my research I have reached the results from it
... Show MoreThe humid and warm conditions in greenhouses provide an excellent environment for pests’ living conditions, and therefore, they provide ideal medium for alien introductions. Molluscs are among the most significant pests that infest plastic covered greenhouses. To identify and report their mollusc species, 23 greenhouses in Iraq were surveyed between March 2023 and April 2024. Of these, 11 were found to be infested with snails. A total of 158 specimens were collected and morphologically identified to seven species: Monacha obstructa (L. Pfeiffer, 1842), Eobania vermiculata (O.F. Müller, 1774), Xeropicta krynickii (Krynicki, 1833), Rumina decollata (Linnaeus, 1758), Polygyra cereolus (Megerle Von Mühlfeld, 1818), Cochlicella barba
... Show More