Uropathogenic E. coli (UPEC) is problematic and still the leading cause of urinary tract infections worldwide. It is developed resistance against most antibiotics. The investigation, surveillance system, and efficient strategy will facilitate selecting an appropriate treatment that could control the bacterial distribution. The present study aims to investigate the epidemiology and associated risk factors of uropathogenic E. coli and to study their antibiotic resistance patterns. 1585 midstream urine specimens were collected from symptomatic urinary tract infections (UTI) patients (225 males and 1360 females) admitted to Zakho emergency hospital, Zakho, Kurdistan Region, Iraq from January 2016 until the end of December 2018. Specimens were inoculated on blood and MacConkey plates and incubated at 37оC for 24 hours. Uropathogenic E. coli was diagnosed based on gram staining, colony characteristics, and standard biochemical tests in accordance with local standards and guidelines. All isolates were screened for their antibiogram pattern using the disk diffusion method based on the Clinical and Laboratory Standards Institute guidelines. The results showed that out of 1585 urine specimens, 1026 (64.7%) were UTIs positive with a statistically higher rate in 2016 (83.6%) (P< 0.0001). The UTIs frequency in females was significantly higher than males (P< 0.0001). Generally, the uropathogenic E. coli represented 21.1% with the highest level in 2016 (22.9%). The uropathogenic E. coli rate was higher, statistically not significant, in females (21.4%) than males (18.5%) (P=0.4946). Additionally, through the three years of study, uropathogenic E. coli (UPEC) was in high frequency in February and May 2016. The female’s age group from 20 to 39 years was the most vulnerable (46%) form total infected females, while those from 70-74 years (1%) were the least susceptible in males and females. A high percentage (80.56 %) of multidrug resistance E. coli isolates was observed with high resistance against -lactamase and macrolides antibiotics. However, higher sensitivity was towards imipenem and meropenem. In conclusion, the wrong and overuse of antibiotics will increase the resistance rate of E. coli. For this reason, proper use of available antibiotics is necessary. Also, the educational programs and periodic monitoring of antimicrobial susceptibility are essential for reducing the antibiotic resistance rate.
in this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
In this paper Volterra Runge-Kutta methods which include: method of order two and four will be applied to general nonlinear Volterra integral equations of the second kind. Moreover we study the convergent of the algorithms of Volterra Runge-Kutta methods. Finally, programs for each method are written in MATLAB language and a comparison between the two types has been made depending on the least square errors.
* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
Signal denoising is directly related to sample estimation of received signals, either by estimating the equation parameters for the target reflections or the surrounding noise and clutter accompanying the data of interest. Radar signals recorded using analogue or digital devices are not immune to noise. Random or white noise with no coherency is mainly produced in the form of random electrons, and caused by heat, environment, and stray circuitry loses. These factors influence the output signal voltage, thus creating detectable noise. Differential Evolution (DE) is an effectual, competent, and robust optimisation method used to solve different problems in the engineering and scientific domains, such as in signal processing. This paper looks
... Show MoreIn this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).
<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>) below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show More