Background: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis. Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications. Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis. Conclusion: As new viruses emerge, diagnostic techniques advance, or we learn more about the pathophysiology of the disease, viral encephalitis has become a more serious public health concern.
Hydrophobic silica aerogels were successfully preparation by an ambient pressure drying method from sodium silicate (Na2SiO3) with different pH values (5, 6, 7, 8, 9 and 10). In this study, acidic HCl (1M), a basic NH4OH (1M) were selected as a catalyst to perform the surface modification in a TMCS (trimethylchlorosilane) solution. The surface chemical modification of the aerogels was assured by the Fourier transform infrared (FTIR) spectroscopic studies. Other physical properties, such as pore volume and pore size and specific surface area were determined by Brunauer-Emmett- Teller (BET) method. The effect of pH values on the bulk density of aerogel. The sol–gel parameter pH value in the sol, have marked effects on the physical proper
... Show MoreAn essential tool for studying the web is its ability to show how energy moves through an ecosystem. Understanding and elucidating the relationship between species variety and their placement within the inclusive trophic dynamics is also beneficial. A food web ecological model with prey and two rival predators under fear and wind flow conditions is developed in this article. The boundedness and positivity of the system’s solution are established mathematically. The stability and existence constraints of the system’s equilibria are examined. The proposed system’s persistence limitations are established. Additionally, the bifurcation analysis of every potential equilibrium is examined using the Sotomayor theorem. To describe the
... Show MoreAtmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show MoreThe significance of the research conducted in northern Iraq comes despite the expansion of afforestation projects; yet, the suffering of the forests has increased due to their lack of scientific study, unpredictability of the climate, and adverse effects on the spread and growth of plant species Therefore, the goal of the study is to understand the effects of afforestation through a statistical analysis of plant diversity in northern Iraq and its distinctivenessThe analysis revealed that natural groupings had improved qualitatively more than other groups, particularly some dwindling species that are able to compete and occupy new areas. drought-prone vegetation, vegetation, and climat
Beta-irradiation effects on the microstructure of LDPE samples have been investigated
using Positron Annihilation Lifetime Technique (PALT). These effects on the orthopositronium
(o-Ps) Lifetime t3, the free positron annihilation lifetime 2 t , the free-volume
hole size (Vh) and the free volume fraction (fh) were measured as functions of Beta
irradiation - dose up to a total dose of 30.28 kGy.
The results show that the values of t3, Vh and fh increase gradually with increasing Beta
dose up to a total dose of 1.289 kGy, and reach a maximum increment of 17.4%, 32.8% and
5.86%, respectively, while t2 reachs maximum increment of 211.9% at a total dose of 1.59
kGy. Above these doses, the values show nonlinear changes u
Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreDocetaxel is an effective treatment approved for many types of cancers, but its effectiveness in clinical practice can be compromised by significant occurrence of adverse drug reactions. The aim of the current study was to measure the distribution of adverse drug reactions of docetaxel reported in Iraq and to assess the causality, severity, seriousness, preventability, expectedness and outcome of these adverse reactions. A retrospective study conducted on individual case safety reports from the Iraqi Pharmacovigilance Center / Ministry of Health. The study included 118 individual case safety report containing 236 adverse drug reactions.
Most of the adverse drug reactions were related to skin and subcutaneous tissue disorders(26.7%), f
The impact of decorating Fe, Ru, Rh, and Ir metals upon the sensing capability of a gallium nitride nanotube (GaNNT) in detecting chlorine trifluoride (CT) was scrutinized using the density functionals B3LYP and B97D. The interaction of the pristine GaNNT with CT was a physical adsorption with the sensing response (SR) of approximately 6.9. After decorating the above-mentioned metals on the GaNNT, adsorption energy of CT changed from −5.8 to −18.6, −18.9, −19.4, and −20.1 kcal/mol by decorating the Fe, Ru, Rh, and Ir metals into the GaNNT surface, respectively. Also, the corresponding SR dramatically increased to 39.6, 52.3, 63.8, and 106.6. This shows that the sensitivity of the metal-decorated GaNNT (metal@GaNNT) increased by in
... Show MoreMetal-organic frameworks (MOFs) are a relatively new class of materials of unique porous structures and exceptional properties. Currently, more than 110,000 types of MOFs have been reported among the countless possibilities. In this study, we have synthesised a novel MOF using zirconium chloride as the metal source and 4,4'-dicarboxy-2,2'-biquinoline (bicinchoninic acid disodium salt) as the linker, which reacted in N,N-Dimethylformamide (DMF) solvent. Three preparation methods were employed to prepare five types of the MOF, and they were compared to optimize the synthesis conditions. The resulting MOFs, named Zr-BADS, were characterised using scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), microscopy, and
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More