Choosing antimicrobials is a common dilemma when the expected rate of bacterial resistance is high. The observed resistance values in unequal groups of isolates tested for different antimicrobials can be misleading. This can affect the decision to recommend one antibiotic over the other. We analyzed recalled data with the statistical consideration of unequal sample groups. Data was collected concerning children suspected to have typhoid fever at Al Alwyia Pediatric Teaching Hospital in Baghdad, Iraq. The study period extended from September 2021 to September 2022. A novel algorithm was developed to compare the drug sensitivity among unequal numbers of Salmonella typhi (S. Typhi) isolates tested with different antibacterials. According to the proposed algorithm, the predicted resistance values were more valid than the observed values. This proposed algorithm is expected to help the hospital antibiotic policy committee recommend the proper antibacterial agents for S. Typhi and further bacterial isolates.
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe study aimed to reveal the extent of the first intermediate grade science curriculum focus on the national values, health, environmental, economic values, in the light of the education policy in the Kingdom of Saudi Arabia, in addition to present a proposed vision to strengthen it in the science curriculum for the first intermediate grade. The study was applied to the two books student and the two books of activity on the first-second semesters for the academic year 1441 AH. To analyze the curriculum content, the study used a verified card prepared by the researchers and a criterion for interpreting percentages. The study reached the following results: environmental values ranked first with a concentration of (43%), i.e. with an avera
... Show MoreAutorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
The Audit evedances represent the reconciliation tools between the Financial data shown on financial statements, and the level of satisfaction level of the Auditor about these statements. According that, the Auditor try to achieve the highest quantity of These evidances, and the most satisfactive of it…, but that will be so hard sometimes, when the internal controlling system is not good, and when the Auditor had some satisfied evidences, but not sharp… So, this research comes to inspect the relation between the quantity, and the level of satisfaction, and argument to prove that evidences gives. This research assumes that getting enough evidences leads to reduce faults, improves the auditing operation, and avoids risks. The research
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show More