Abstract
As one year elapsed since COVID-19 outbreak, venous and arterial thromboses are increasingly reported in different vascular territories. Once accessed by the virus, the endothelial cells, abundant in angiotensin converting enzyme-2 (ACE-2) protein, will be activated by the inflammatory process leading to coagulopathy and vascular lesions. Herein, we describe a case of extensive thrombosis of the infra-renal inferior vena cava and iliac femoral vein in a man of 62 and a case of acute superficial femoral artery thrombosis in a lady of 55. Both were COVID-19 confirmed cases with severe pneumonia, high D-Dimer levels and risk factors for severe disease or death. Despite presentation 1-2 weeks after the onse
... Show MoreThis research aims to modify the components of stainless steel alloy by the method of surface engineering through the single diffusion coating technique in order to obtain new alloys with high efficiency in resisting harsh environmental conditions. Steam a mixture of sodium chloride ( ) and sodium sulfate ( ) at a temperature of 900 and then compare it with the base alloy. The results showed that the alloys produced in this way are very efficient. The results showed that the aluminum coating showed high efficiency in resisting oxidation and provided better protection for a longer time compared to the uncoated alloy due to the oxide crust layer formed with high adhesion as well as the aluminum-rich phases, whether the phase
... Show More
J Fac Med Baghdad 2023; Vol.65, No. 3 Received:March., 2023 Accepted: June. 2023 Published: Oct. 2023
|
The Audit evedances represent the reconciliation tools between the Financial data shown on financial statements, and the level of satisfaction level of the Auditor about these statements. According that, the Auditor try to achieve the highest quantity of These evidances, and the most satisfactive of it…, but that will be so hard sometimes, when the internal controlling system is not good, and when the Auditor had some satisfied evidences, but not sharp… So, this research comes to inspect the relation between the quantity, and the level of satisfaction, and argument to prove that evidences gives. This research assumes that getting enough evidences leads to reduce faults, improves the auditing operation, and avoids risks. The research
... Show MoreTwo hundred staphylococcal isolates isolated from milk and white cheese samples, which were collected from local markets in Baghdad. The predominant species was Staphylococcus aureus 97 isolates (48.5%), followed by S.chromogenes 82 (41%) and 21 (10.5%) S.epidermidis isolates. The pattern of antibiotic susceptibility of Coagulase Positive Staphylococci (COPS) and Coagulase Negative Staphylococci (CONS) isolates to 3 antibiotics (Methicillin, Tetracyclin and Vancomycin) was determined using disc diffusion method; the results revealed that 80 S. aureus isolates (82.47%) found to be methicillin resistant (MRSA) while 8 isolates (8.24%) were vancomycin resistant (VRSA) and 18 S. aureus isolates (18.5%) resist tetracycline antibiotic. Sixty f
... Show MoreThe biological diversity of Klebsiella pneumoniae (K. pneumoniae) has widely been reported to be associated with pathological progress in severe nosocomial and community-acquired infections. 250 clinical specimens included sputum, urine and swabs from wound and burns samples were collected from Al-Batool Teaching Hospital (38.4%), Baqubah Teaching Hospital (61.6%) and private laboratories in Baqubah and Diyala, Iraq. Positive rates of nosocomial acquired infection were sputum 98%, urine 96%, and swabs from wound and burns 94%, while positive rates of community acquired infection were sputum 60%, urine 60%, and swabs wound and burns 30%. Positive rates of nosocomial and community acquired infections were 96% and 48%, res
... Show MoreThe objective of this paper is determining the petrophysical properties of the Mauddud Formation (Albian-Early Turonian) in Ratawi Oil Field depending on the well logs data by using interactive petrophysical software IP (V4.5). We evaluated parameters of available logs that control the reservoir properties of the formation, including shale volume, effective porosity, and water saturation. Mauddud Formation is divided into five units, which are distinguished by various reservoir characteristics. These units are A, B, C, D, and E. Through analyzing results of the computer processed interpretation (CPI) of available wells, we observed that the main reservoir units are B and D, being distinguished by elevated values of eff
... Show MoreThis research seeks through the adoption of two basic variables, where he considered the actuarial experience as an independent variable, while the process of accepting the risk and dimensions related to it is a dependent variable, the research was adopted to present the data achieved by the company during the life insurance business during the adoption of actuarial experience at the beginning of its work where Adoption of the historical method in the analysis of those data to prove the researcher's opinion, through the analysis of data (5 years) for the first period, which extends between (1975-1979), the period during which the company adopted the actuarial experience at the time, also taken data for the same dimensions related to the
... Show MoreThe objective of this study is to explain the role of credit policies in agricultural development of Iraq during the period 1979-1989 which were represented by the policy of co-operative agricultural bank the organization that responsible to finance agricultural sector for various reasons. It has been shown that there was no clear credit policy existed during the period concerned due to the differences between loans from year. The loan growth rate was low in general comparing with objectives of the agricultural development plans, a low production rates comparing with loans paid, the growth rate of average number of trees in each donum and the growth rate of livestock number was also low.In conclusion there should be a clear plan for cred
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More