Contracaecum rudolphii Hartwich, 1964 is a nematode which causes major concerns to human and wildlife animal’s health. However, the population genetics of C. rudolphii has been poorly studied in Iraq. In order to gain a deeper understanding in the outline of the genetic diversity of the nematode C. rudolphii that were isolated from its host cormorant Phalacrocorax carbo (Linnaeus, 1758), in the middle areas of Iraq, twenty specimens of C. rudolphii adults were isolated from nine individuals of P. carbo. The first (ITS-1) internal transcribed spacers (ITS) of ribosomal DNA (rDNA) of C. rudolphii were amplified using conventional polymerase chain reaction (PCR); then, the amplicons were subjected to sequencing. Concatenation of ITS-1 (rD
... Show MoreAeromonas salmonicida is a fish pathogen and recognized to cause a variety of diseases in humans. There are a few information about A.salmonicida in Iraq and there is no any previous molecular study on it. During the period of December 2017 to May 2018; Sixteen isolates of the A. salmonicida were isolated and identified from 300 common carp (Cyprinus carpio) fishes stomach in aquarium of Erbil city/ Iraq by using manual, automated Vitek 2 compact system, and confirmed by PCR using gene TonB-dependent siderophore (364bp). Antimicrobial susceptibility was determined by disk diffusion method and the results found that all isolates 100% susceptible to imipenem, 100% resistant to nalidixic acid and variable resistan
... Show MoreSince its first description as a cytotoxic agent, Olea europaea leaves extract gained significant popularity against human breast cancer, ethyl acetate extract of Olea europaea leaves obtained by acid hydrolysis method was evaluated in vitro as cytotoxic agent against new human breast cancer (AMJ13) cell line, using the MTT assay. One main pentacyclic triterpenoid; oleanolic acid, was isolated from leaves of Olea europaea by well-known two different methods, but not used for this compound before, the acidic hydrolysis method and basic acidic method. The presence of oleanolic acid was proved in both methods with qualitative and quantitative d
... Show MorePeople who undertaken different X-ray examinations are already exposed to ionizing radiation which causes biological effects. Therefore assessing the patient radiation dose is a prerequisite element in optimizing the X-ray practice and to avoid the unnecessary radiation dose. The aim of this research is to assess the skin radiation dose for those patients who undertaking routine X-ray examinations in selected three hospitals in Al Najaf city.
Three X-ray units were involved in this experimental study; these were belonging to three hospitals in Al Najaf city-Iraq, namely Al-Sadder teaching hospital, Al-Hakeem general hospital and Al-Zahraa hospital. Data of exposure parameters (tube potential (kVp), tube c
... Show MoreEimeriosis is a major problem affecting ruminants worldwide. The disease is primarily caused by Eimeria species, which are specialized for each host and grow in the small and large intestine of animals. The losses due to subclinical infections (especially weight loss) and clinical disease (diarrhea) make the species of this genus a very significant economic concern. Therefore, this study was conducted in some areas of Wasit Province. A total of 180 fecal samples from goats, of both sexes and covering different age groups and months, were collected. All fecal samples were examined microscopically, and 75 positive fecal samples were taken for molecular examination and further analyzed using conventional PCR, sequencing and phylogeneti
... Show MoreBackground: The healing process involves the restoration of the body’s structural integrity. The extracellular matrix, blood cells, cytokines, and growth factors are all involved in this dynamic, intricate, multicellular process. Hemostasis, the inflammatory phase, the proliferative phase, and the maturation phase are all included. Opuntia ficus-indica oil (OFI) and Punica grantum (PGS) oil are extensively used natural treatments that are regarded as advantageous for their sedative, spasmolytic, and anti-inflammatory properties, as well as for angiogenesis promotion, fibroblast increase, collagen production and deposition, and extracellular-matrix remodeling. Materials and methods: Twenty-four New Zealand rab
... Show MoreThe current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study aims at investigating the partial Islamic rules of preparing and distributing cartoons in order to issue an overall Islamic rul. To reach an end, descriptive and analytical approaches are adopted to clarify the nature of cartoons and other related concepts. The researcher, as well, with reference to verses of the Holy Quran, tradition (Hadith) and Islamic jurists, adopts a deductive approach to issue Islamic rules related to the industry of cartoons and it's distribution
The study consists of three sections. The first Section addresses the following issues: Definition animation; and related wordy. The second Section: Origin of Cartoon's history and it's negative and positive effects. The third Section: Islamic rules related