BACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity training sessions of the whole community. AIM: We aimed to asses the correlation between TB burden and COVID-19 mortality in all affected countries having different BCG vaccination policies. METHODS: Publicly available data were extracted for 191 countries including population size, TB estimations, national BCG vaccination policy, the World Health Organization regions and economic classification, and COVID-19 mortality and number of cases. The analysis was performed using Spearman’s correlation test. RESULTS: Significant large negative correlation (−0.539, p < 0.001) was found between TB prevalence and COVID-19 mortality rate worldwide. Medium negative significant correlations were found between TB cases and COVID-19 mortality in the high and lower middle-income countries, and those having current BCG vaccination programs (−0.395, p = 0.001, −0.365, p = 0.015, and −0.476, p < 0.001, respectively). CONCLUSION: Countries with high TB prevalence have higher chances of protection against COVID-19 mortality through the theory of widely distributed natural immune activation within community. Confounders should be assessed separately.
The surgical treatment of inferior turbinate hypertrophy (ITH) is challenging. Submucosal diathermy (SMD) is a well-known surgical procedure used for the treatment of ITH, microdebrider-assisted rhinoplasty (MAT) is relatively a newer technique used in the management of ITH. To evaluate the effect of MAT on inferior turbinate size and nasal airway patency in patients with bilateral ITH in comparison to SMD. Seventy-one patients presented with nasal obstruction due to bilateral ITH were allocated into two groups, group a (35 patients) were subjected to SMD and 36 patients in group B were subjected to MAT. All the patients had been sent to CT scan pre-operatively and at the third postoperative month to measure the cross-sectional areas
... Show MoreClavicle fractures are common injuries in young, active individuals. The majority of the fractures (80% to 85%) occur in the mid-shaft of the bone and account for approximately 2.6% of all fractures. For many years the standard treatment of fracture clavicle was the "figure-of-eight" bandage but several indications for operative fixation, the position of plate fixation for clavicle fracture remains controversial. The aim of this study is to compare between anterio—inferior and anterior-superior plating of mid-shaft displaced clavicle fracture in complications, plate prominence, nonunion, malunion and range of motion. This study is a prospective study conducted in Al-Kindy teaching hospital .A total of 30 patients with fracture mid –sh
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show More