Preferred Language
Articles
/
bijps-484
Acquired Error in using Antibiotic for Surgery Patients in Iraqi Hospitals
...Show More Authors

The use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 from Al-kadhimiya hospital, 86% were female and 32% were male, their age range was 40 +/- 15. The study shows that there are medication errors related to different causes: firstly, medical team error which include the nurse (70.9%) and the physician which include 1) delay in  patient follow up after operation(5.9%) ,  2) changing the AB without doing culture and sensitivity test (48.8%), and incomplete prescription order(13.1%).  second:  ordering error which include: 1) the absent of original source of AB (44.5%), 2) Error in availability of the chosen AB (74.8%), and third: error related to the patient itself include 1) socioeconomic situation (14.5%), 2) educational state (54.3%), finally error related to increase cost in dispensing more than one AB needed (80.1%), although the healing was (63.6 %), delay in response (25%) and complicated wound infection (5%), significant results were arrange nurse error and poor drug availability. In conclusion:  medication errors are still common problem in our hospitals, which are mostly related to medical team and the pharmacists should give more effort to avoid these errors.   

Key wards: Acquired error, Antibiotic, Surgery patients.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fast Training Algorithms for Feed Forward Neural Networks
...Show More Authors

 The aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN

View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Review on Hybrid Swarm Algorithms for Feature Selection
...Show More Authors

    Feature selection represents one of the critical processes in machine learning (ML). The fundamental aim of the problem of feature selection is to maintain performance accuracy while reducing the dimension of feature selection. Different approaches were created for classifying the datasets. In a range of optimization problems, swarming techniques produced better outcomes. At the same time, hybrid algorithms have gotten a lot of attention recently when it comes to solving optimization problems. As a result, this study provides a thorough assessment of the literature on feature selection problems using hybrid swarm algorithms that have been developed over time (2018-2021). Lastly, when compared with current feature selection procedu

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Birefringence for Elliptical-Core Fibers with Low Ellipticities
...Show More Authors

Model birefringence was measured for elliptical-core fibers with low ellipticities, note the birefringence depends strongly on the frequency, especially when fiber is being operated near the higher mode cutoff where ν  for circular fiber of the single-mode type that correspond to the birefringence maximum. When ν  this also correspond to the birefringence maximum that can be introduced in an elliptical core fiber while still operating in the single-mode regime near the higher mode cutoff. Also the birefringence is proportional to the fiber core ellipticity when core ellipticity is much less than unity, but this birefringence deviates from the linear for the large core ellipticities.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Profiles and Geotechnical Properties for some Basra Soils
...Show More Authors

 Abstract

Basra province is known for its logistic location for trading activity and oil industry. By geological point of view, Basra areas are believed to consist mainly of alternation of (clay, silty clay, clayey silt, silt and sand) type of soil. Any development of industry in this area should be affected by the occurrence of the clay soil. That is why the investigation to the soil is more than necessary. In this case, a vast testing program was carried out by the author to evaluate the various formations constituting the of some Basra soils. An attempt to characterize and discuss the nature, minerals, engineering behavior and field properties of soil samples extracted from more than one thousand and one

... Show More
View Publication Preview PDF
Publication Date
Thu May 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modulation Function Calculation For Optical Semiconductor Fractal Modulator
...Show More Authors

   The research  includes the study and calculation of the modulation function of Optical Semiconductor Fractal  Modulator and spatial frequency for different values of Silicon modulator transmittance percentage(10%,35%,45%,58%),it found the relation between the modulation function of Silicon and spatial frequency, the exponential relation of all values of the transmittance , the best state of modulation function when the value of transmittance is T=58% ,also the research includes the study of the relation of transmittance with different values of refractive index of Silicon . So the research involves building a computer program of output data which would relate to fractal optical modulation made of semiconductor mate

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Family preference for the presence of cortical yellow
...Show More Authors

The population density of the insect on Alorat and fruits located in the lower part of the tree more than the middle part of the plant and insect in one place and demonstrates that there is a nest there were conducted laboratory and field studies on citrus Hsasahanwaa and the Alvdaúaa distribution of cortical insect yellow ....

View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Antimagic Labeling for Some Families of Graphs
...Show More Authors

Antimagic labeling of a graph  with  vertices and  edges is assigned the labels for its edges by some integers from the set , such that no two edges received the same label, and the weights of vertices of a graph  are pairwise distinct. Where the vertex-weights of a vertex  under this labeling is the sum of labels of all edges incident to this vertex, in this paper, we deal with the problem of finding vertex antimagic edge labeling for some special families of graphs called strong face graphs. We prove that vertex antimagic, edge labeling for strong face ladder graph , strong face wheel graph ,  strong face fan graph , strong face prism graph  and finally strong face friendship graph .

View Publication Preview PDF
Crossref