Preferred Language
Articles
/
bsj-4124
Detection of CTX-M-type ESBLs from Escherichia coli Clinical Isolates from a Tertiary Hospital, Malaysia
...Show More Authors

The present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%).  After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL producing E. coli against antibiotics belonging to different families showed the highest resistance rates to Ampicillin (100%), Cefotaxime (97%), Cefuroxime (95%), and Ciprofoxacin (86%). Carbapenem groups of antibiotics, Meropenem (89%) and Imipenem (85%) have the highest susceptibility rate among all antibiotics used in this study. The outcome of the antimicrobial susceptibility testing of significant CTX-M- type ESBL producing E. coli could be useful to avoid failure or prolong treatments.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 15 2022
Journal Name
International Journal Of Science& Research Archive
Nonalcoholic fatty liver disease in a group of Iraqi obese children attending children welfare teaching hospital
...Show More Authors

Nonalcoholic fatty liver disease in a group of Iraqi obese children attending children welfare teaching hospital

Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The dimensions of Financial inclusion and its role in achieving competitive advantage: An exploratory research of the views of a sample of clients of the Algerian commercial Banks
...Show More Authors

The research aims to identify the role of the dimensions of financial inclusion in achieving the competitive advantage by An exploratory research of the views of a sample of customers of the 20 Algerian commercial banks, And the relationship between its dimensions (Access dimension, Usage dimension, Quality) And competitive advantage. This research is based on the analytical descriptive approach. The questionnaire was adopted as a main tool in collecting data and information on the sample of 377.

The The research showed several results, the most important of which is a strong correlation between the dimensions of the three financial inclusion combined and the competitive advantage of the Algerian commercial banks, and explained t

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Nicotine Extraction from Tobacco Wastes
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Morals Strategies from Sunnah Depending
...Show More Authors

The study aims at elicitation the morals strategies from sunnah depending on the analytic-qualitative method. It revealed a comprehensive integrated system of creative strategies to improve morals. It was categorized into three areas: cognitive strategies, affective strategies, and some strategies based on self-initiative and practice. The researcher recommended that teachers and educators should employ these effective strategies in the process of moral guidance for the Muslim generation. He also recommended that researchers should put more effort to do more In-depth qualitative studies, which must be directed to establish the origin of different education strategies from the Holy Qur’an, the Sunnah, and Muslim scholars’ legacy.

View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SOME ORMYRIDAE (HYMENOPTERA , CHALCIDOIDEA) FROM IRAQ
...Show More Authors

The family Ormyridae has been very much neglected by workers and only two species has been recorded so far from Iraq. The present study, based mainly on my collection, deals with five species, of which one is new to science. The new species is described together with notes on locality data, host records, distribution and taxonomical remarks for all the species.

View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Neuroquantology
Reaction Cross Section Variations of (alpha + 22Ne) in Msun<M<4Msun AGB Stars
...Show More Authors

Listed

Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Engineering
Experimental Study of Natural Convection in a Closed Cavity (Static Type Domestic Fridge)
...Show More Authors

This work provides an analysis of the thermal flow and behavior of the (load-free) refrigerator compartment. The main goal was to compare the thermal behavior inside the refrigerator cavity to the freezer door (home refrigerator) effect and install a fan on the freezer door while neglecting the heat transmitted by thermal radiation. Moreover, the velocity distribution, temperature, and velocity path lines are theoretically studied. This was observed without affecting the shelves inside the cabinet and the egg and butter places on the refrigerator door as they were removed and the aluminum door replaced with a glass door. This study aims to expand our knowledge about the temperature and flow fields of this refrigerator mo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
factors determining pricing strategies in Iraqi business market – on analytic study in a number of industrial sector companies
...Show More Authors

Pricing has an important position among the elements of marketing mixture (4ps) as it represents revenues that in turn represent one of the important  pillars' for resources affecting on organizations sustainability and development , and the failure in determining prices and their strategies has a dangerous effect on the organizations reality and future as a whole . from this point,  this is what from the focus of the research problem,which centered on how to get companies to critical price that satisfies customers and achieve corporate objectives.                          

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Factors that Effect on the Level of Accounting Conservatism A sample study Of insurance companies which listed on the Amman Stock Exchange (2005-2016)
...Show More Authors

This study aimed to measure  the accounting conservatism  and the lemited factors which  affected on it in the annual financial reports of insurance companies which listed on the Amman Stock Exchange during the period from 2005 to 2016, these factors were represented by firm age, firm debt and firm size.

Using the market value model (MV) To book value  ( BV) Beaver and Ryan (2000) The level of the accounting conservatism was measured. The study found that the insurance companies which are listed on the ASE exercise the accounting conservatism when they were  preparing financial reports. And when conducting a process  of the test of the affected of the factors (The age of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref