Burn is one of the most devastating traumas that someone can encounter in their life. Burn wound sepsis is still the leading cause of death in burned patients. Appropriate knowledge of the causative pathogen in burn sepsis is important for successful patient management and for the reduction of the incidence of antibiotic resistance. A retrospective study was conducted between 2010 and 2018 at the Burn Specialty Hospital in Baghdad.Atotal of 320 blood culture samples were obtained from patients with sepsis orsuspected of having sepsis. Patient age ranged between 9 months to 70 years old, with a mean total burn surface area of 45.26%. The most common microorganisms isolated from those patients who had sepsis or suspicion of sepsis were Klebsiella (48 cases) followed by Pseudomonas (36 cases), Staphylococcus species (26 cases), Enterococcus (8 cases), Acinetobacter (11 cases), E-Coli (11 cases), Candida (4 cases), Proteus (2 cases), and Salmonella, Streptococcus pneumonia, Monilia, and Seriata one case for each. The most commonly isolated organism was Klebsiella: it was sensitive to Imipenem followed by Amikacin, Nitrofurantoin, Piperacillin, Ciprofloxacin, Co-trimoxazole, Chloramphenicol, Tetracycline, Azithromycin and Cefotaxime. Microbio- logical surveillance of burn patients with sepsis or suspicion of having sepsis over a period of 9 years in our hospital has shown that the most common microorganism isolated from blood cultures was Klebsiella. Kleb- siella was sensitive to Imipenem mainly according to sensitivity testing using the disk diffusion method.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
The purpose of this study is to measure the levels of quality control for some crude oil products in Iraqi refineries, and how they are close to the international standards, through the application of statistical methods in quality control of oil products in Iraqi refineries. Where the answers of the study sample were applied to a group of Iraqi refinery employees (Al-Dora refinery, Al-Nasiriyah refinery, and Al-Basra refinery) on the principles of quality management control, and according to the different personal characteristics (gender, age, academic qualification, number of years of experience, job level). In order to achieve the objectives of the study, a questionnaire that included (12) items, in order to collect preliminary inform
... Show MoreThis world is moving towards knowledge economy which basically depends on knowledge and information. So, the economic units need to develop its financial reporting system which helps to provide useful information in timeliness for investors in accordance with the requirements of the knowledge economy and meets the needs of those investors. This research aims to revealing the reflects of knowledge economy on the approaches of financial reporting and suggesting a financial reporting model in the environment of knowledge economy, depending on combining the value approach with the events approach using database and communication technology and providing useful accounting information for all users regardless of
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreAbstract Drug addiction is considered a criminal behavior, which led the Iraqi legislator to prohibit and criminalize it, imposing penalties on those who use or even approach it. This aims to limit its presence in Iraq and reduce unethical behaviors, leveraging the divine prohibition to curb it. The legislator also encourages media organizations to raise awareness about the dangers of this substance, which has contributed to reducing the phenomenon of drugs in Iraq.
The present study is meant to inquire about the training needs of middle stage leaders in Bisha, (Saudi Arabia) from the perspective of teachers. To achieve this purpose, the researcher has designed a questionnaire containing (31) items, distributed to a sample of (157) teacher (male and female) from the target population.
This research has demonstrated that the level of training needs for middle stage leaders was moderately reported with an arithmetic mean equivalent to (2.42), and a standard deviation of (0.36). Results have shown no significant differences at (α=0.05) in the sample’s expectations of the study’s variables.
The study concludes with a list of recommendations such as working on developing training pro
... Show More