Until today, one of the leading predominant infections is Urinary tract infection (UTI). It exerts a huge burden on health systems worldwide each year. Treating UTIs empirically with antimicrobials improves morbidity rates. This study aims to assess the prevalence of UTI-associated bacteria in adult patients and to determine their antibiotic susceptibility profile. A retrospective study was conducted for adult outpatients who visited Al-Diwaniya tertiary hospitals from January 2020 till February 2022 to review their medical and lab records in addition to sociodemographic data. A total of 256 patients’ records were included of which 204 (79.7%) belong to females and 52 (20.3%) were males with an average age of 39.22±17.10 years. The predominant organisms’ isolates were Staphylococcus spp. found in 100 records (39.1%), Escherichia coli (E. coli) demonstrated in 90 records (35.2%), and Klebsiella spp. (K. spp.) revealed in 23 records (9%). Staphylococcus spp. (Staph. spp.) showed high resistance to ampicillin (92.9%) followed by ceftazidime (87.5%), and were highly sensitive to vancomycin. The higher resistance profile of E. coli was to ampicillin (97.9%) and ceftriaxone (81.3%) while was highly susceptible to meropenem (97.9%) and amikacin (97.6%). Additionally, Klebsiella spp. was highly susceptible to nitrofurantoin (78.6%), while was completely resistant to ampicillin. This study presents Staphylococcus spp. as the most prevalent gram-positive uropathogen and E. coli as the most prevalent gram-negative bacteria with a multidrug resistance profile to commonly used antimicrobials which is an alarming situation to implement an immediate effective stewardship program.
irrigation use at many stations along the Euphrates River inside the Iraqi lands and to try to correlate the results with the satellite image analyses for the purpose of making a colored model for the Euphrates that can be used to predict the quality classifications of the river for irrigation use at any point along the river. The Bhargava method was used to calculate the water quality index for irrigation use at sixteen stations along the river from its entrance to the Iraqi land at Al-Qaim in Anbar governorate to its union with the Tigris River at Qurna in Basrah governorate. Coordinates of the sixteen stations of the Euphrates River were projected at the mosaic of Iraq satellite image which was taken from LANDSAT satellite for bands 1, 2
... Show MorePyrolysis of high density polyethylene (HDPE) was carried out in a 750 cm3 stainless steel autoclave reactor, with temperature ranging from 470 to 495° C and reaction times up to 90 minute. The influence of the operating conditions on the component yields was studied. It was found that the optimum cracking condition for HDPE that maximized the oil yield to 70 wt. % was 480°C and 20 minutes. The results show that for higher cracking temperature, and longer reaction times there was higher production of gas and coke. Furthermore, higher temperature increases the aromatics and produce lighter oil with lower viscosity.
The focus of this article, reviewed a generalized of contraction mapping and nonexpansive maps and recall some theorems about the existence and uniqueness of common fixed point and coincidence fixed-point for such maps under some conditions. Moreover, some schemes of different types as one-step schemes ,two-step schemes and three step schemes (Mann scheme algorithm, Ishukawa scheme algorithm, noor scheme algorithm, .scheme algorithm, scheme algorithm Modified scheme algorithm arahan scheme algorithm and others. The convergence of these schemes has been studied .On the other hands, We also reviewed the convergence, valence and stability theories of different types of near-plots in convex metric space.
A comparison of double informative and non- informative priors assumed for the parameter of Rayleigh distribution is considered. Three different sets of double priors are included, for a single unknown parameter of Rayleigh distribution. We have assumed three double priors: the square root inverted gamma (SRIG) - the natural conjugate family of priors distribution, the square root inverted gamma – the non-informative distribution, and the natural conjugate family of priors - the non-informative distribution as double priors .The data is generating form three cases from Rayleigh distribution for different samples sizes (small, medium, and large). And Bayes estimators for the parameter is derived under a squared erro
... Show MoreABSTRACT
The study was conducted at the ruminant research station of the general commission for agricultural research/Ministry of Agriculture, as well as the laboratory of genetic resources of the department of livestock/Ministry of Agriculture and the laboratory of the college of agriculture engineering science, with the aim of determine the genotypic of the expression region (intron 2 and part of exon 3) of the LHX3 gene And its relationship to the fertility rate in local and Shami goats. For this purpose, the RFLP technique was used, and the percentages of genotypes for the LHX3 gene in the local goat sample were 29.17, 50.00, 20.83 for the TT, AT, and AA genotypes, respectively, while in the Shami goa
... Show MoreBeing the meeting points of the world different languages and out of a scholarly perspective, comparative literature represents a cultural leap as well as an artistic and intellectual development or a global literary movement of both prose and poetry. Such homogenous literary structure requires a systematic and coherent study of the literary output of the people different cultures and civilizations. It also represents the theoretical approach of the present study that debates a systematic comparison between Ghassan Kanafani’s All That's Left to You and William Faulkner’s. The Sound and the Fury. Within the perspective of the descriptive analysis approach, the present paper discusses th
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreBackground: Insulin resistance (IR) is the primary metabolic disorder associated with obesity. Obesity is a growing worldwide health problem affecting both adults and children. Objectives: To determine the association between leptin and IR, and to identify the ratio of fasting glucose/leptin (G/L) and insulin/leptin (I/L) as a new simple method for the detection of IR in obese children.Methods: This study was done in the National DiabeticCenter/ AL-Mustansiriya University during the period fromMay 2013 until the end of October 2013. Fasting bloodglucose (FBG), serum insulin, leptin, and lipid profile weremeasured in 52 obese children (24 children with IR and 28without IR); their age range was (5-15) years, they werecompared with 38 healt
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More