Until today, one of the leading predominant infections is Urinary tract infection (UTI). It exerts a huge burden on health systems worldwide each year. Treating UTIs empirically with antimicrobials improves morbidity rates. This study aims to assess the prevalence of UTI-associated bacteria in adult patients and to determine their antibiotic susceptibility profile. A retrospective study was conducted for adult outpatients who visited Al-Diwaniya tertiary hospitals from January 2020 till February 2022 to review their medical and lab records in addition to sociodemographic data. A total of 256 patients’ records were included of which 204 (79.7%) belong to females and 52 (20.3%) were males with an average age of 39.22±17.10 years. The predominant organisms’ isolates were Staphylococcus spp. found in 100 records (39.1%), Escherichia coli (E. coli) demonstrated in 90 records (35.2%), and Klebsiella spp. (K. spp.) revealed in 23 records (9%). Staphylococcus spp. (Staph. spp.) showed high resistance to ampicillin (92.9%) followed by ceftazidime (87.5%), and were highly sensitive to vancomycin. The higher resistance profile of E. coli was to ampicillin (97.9%) and ceftriaxone (81.3%) while was highly susceptible to meropenem (97.9%) and amikacin (97.6%). Additionally, Klebsiella spp. was highly susceptible to nitrofurantoin (78.6%), while was completely resistant to ampicillin. This study presents Staphylococcus spp. as the most prevalent gram-positive uropathogen and E. coli as the most prevalent gram-negative bacteria with a multidrug resistance profile to commonly used antimicrobials which is an alarming situation to implement an immediate effective stewardship program.
Amongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThis paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MorePhysiological status and litter size can indeed have a significant impact on ewes' hematological parameters, which are essential indicators of their health. Therefore, this study examined the hematological profiles of ewes during pregnancy with single and twins in the Awassi ewes. The present study involved 232 ewes in good health and at sexual maturity. Among them, 123 ewes had single pregnancies, while 109 ewes had twin pregnancies. The age range of the ewes included in the study was between 3.5 and 4.5 years. Hematological tests were conducted on the sheep's blood samples promptly following collection. The findings demonstrated variations in hematological parameters among pregnant
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.