Preferred Language
Articles
/
uxY5TocBVTCNdQwCuUMW
Cheek onchocercoma: A case report
...Show More Authors

Onchocerciasis is an infection with cutaneous, ocular and systemic manifestations caused by the filarial nematode Onchocerca volvulus, which is transmitted by the bite of various species of the anthropophilic blood-sucking Simulium vectors (black flies). Onchocerciasis is endemic to the savannahs and rainforests of subequatorial Africa and in some countries of the Arabian Peninsula, notably Yemen and Oman, and in Central America, and the Amazon basin of South America. Onchocercomas, which can be defined as subcutaneous fibrous nodules containing adult worms, are among the variable clinical manifestations of this infestation; they are either superficial or deep and usually located over bony prominences. In this paper we report a case of an onchocercoma of the cheek affecting an Iraqi child that was surgically excised. To the best of our knowledge, this is the first case of onchocerciasis in general and onchocercoma in particular that is reported in Iraq with an unusual site, since most of the reported cases occur over bony prominences, and head nodules are reported to occur mostly in the scalp region.

Scopus Crossref
View Publication
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Proposed Analytical Method for Solving Fuzzy Linear Initial Value Problems
...Show More Authors

     In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements  and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
A comparative taxonomic study of nutlets of Stachys L. in Iraq
...Show More Authors

Nutlets of 22 taxa of Stachys (13 species and seven subspecies and two varieties), representing seven of the currently recognized sections distributed in northern Iraq were examined by light microscope. The basic shape of nutlets in most taxa studied is Obovoid, but Oblong also found in S.megalodanta Hausskn.& Bornm. ex P.H.Davis, S.setirefa C.A.Mey. subsp daenensis (Gandog.) Rech.f.and S. kurdica Boiss.& Hohen. var.kurdica, while the Subgloboid shape found in S. iberica M.Bieb. and S. inflata Benth., more over the Broad triangular shape was found in S. nephrophylla Rech.f. and S.lanigera (Bornm.) Rech.f.., the biggest size of nutlets was found in S.inflata L. and the smallest was in S.melampyroides Hand.-Mzt. Regarding sculpturing pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Thu Nov 01 2018
Journal Name
Italian Journal Of Vascular And Endovascular Surgery
Retroperitoneal versus transperitoneal approach for aortoiliac occlusive disease: a comparative study
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Aug 19 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
HUMOUR IN THE AMERICAN AND BRITISH COMEDYEPISODES: A DISCOURSE ANALYSIS STUDY
...Show More Authors

DBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020

View Publication
Publication Date
Fri May 31 2024
Journal Name
Journal Of Current Medical Research And Opinion
Comparing Different Training Methods in Cardiopulmonary Resuscitation CPR: A Narrative Review
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
A New Regimen in the Treatment of Psoriasis Using Oral Methotrexate
...Show More Authors

View Publication
Crossref
Publication Date
Thu May 01 2003
Journal Name
Renewable Energy
FT-IR and XPS analysis of a-Si1-xGex:H thin films
...Show More Authors

View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF