Preferred Language
Articles
/
bijps-2034
Determining the Prevalence of Upper and Lower Urinary Tract Infections’ Pathogens and Their Antibiotic Susceptibility Profile for Adult Patients in Al-Diwaniya, Iraq (Conference Paper) #
...Show More Authors

Until today, one of the leading predominant infections is Urinary tract infection (UTI). It exerts a huge burden on health systems worldwide each year. Treating UTIs empirically with antimicrobials improves morbidity rates. This study aims to assess the prevalence of UTI-associated bacteria in adult patients and to determine their antibiotic susceptibility profile. A retrospective study was conducted for adult outpatients who visited Al-Diwaniya tertiary hospitals from January 2020 till February 2022 to review their medical and lab records in addition to sociodemographic data. A total of 256 patients’ records were included of which 204 (79.7%) belong to females and 52 (20.3%) were males with an average age of 39.22±17.10 years. The predominant organisms’ isolates were Staphylococcus spp. found in 100 records (39.1%), Escherichia coli (E. coli) demonstrated in 90 records (35.2%), and Klebsiella spp. (K. spp.) revealed in 23 records (9%). Staphylococcus spp. (Staph. spp.) showed high resistance to ampicillin (92.9%) followed by ceftazidime (87.5%), and were highly sensitive to vancomycin. The higher resistance profile of E. coli was to ampicillin (97.9%) and ceftriaxone (81.3%) while was highly susceptible to meropenem (97.9%) and amikacin (97.6%). Additionally, Klebsiella spp. was highly susceptible to nitrofurantoin (78.6%), while was completely resistant to ampicillin. This study presents Staphylococcus spp. as the most prevalent gram-positive uropathogen and E. coli as the most prevalent gram-negative bacteria with a multidrug resistance profile to commonly used antimicrobials which is an alarming situation to implement an immediate effective stewardship program.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
A Study in Tess of the D’Urbervilles as A Call for Liberal Education for Women
...Show More Authors

Amongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
ESO-based repetitive control for rejecting periodic and aperiodic disturbances in piezoelectric actuators
...Show More Authors

This paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Lecture Notes In Computer Science
Constrained Differential Evolution for Cost and Energy Efficiency Optimization in 5G Wireless Networks
...Show More Authors

The majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
The Iraqi Journal Of Veterinary Medicine
Hematological Parameters as Indicators for Litter size and Pregnancy Stage in Awassi ‎Ewes
...Show More Authors

Physiological status and litter size can indeed have a significant impact on ewes' ‎hematological parameters, which are essential indicators of their health. Therefore, this study ‎examined the hematological profiles of ewes during pregnancy with single and twins in the ‎Awassi ewes. The present study involved 232 ewes in good health and at sexual maturity. ‎Among them, 123 ewes had single pregnancies, while 109 ewes had twin pregnancies. The age ‎range of the ewes included in the study was between 3.5 and 4.5 years. Hematological tests ‎were conducted on the sheep's blood samples promptly following collection. The findings ‎demonstrated variations in hematological parameters among pregnant

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.