Burn is one of the most devastating traumas that someone can encounter in their life. Burn wound sepsis is still the leading cause of death in burned patients. Appropriate knowledge of the causative pathogen in burn sepsis is important for successful patient management and for the reduction of the incidence of antibiotic resistance. A retrospective study was conducted between 2010 and 2018 at the Burn Specialty Hospital in Baghdad.Atotal of 320 blood culture samples were obtained from patients with sepsis orsuspected of having sepsis. Patient age ranged between 9 months to 70 years old, with a mean total burn surface area of 45.26%. The most common microorganisms isolated from those patients who had sepsis or suspicion of sepsis were Klebsiella (48 cases) followed by Pseudomonas (36 cases), Staphylococcus species (26 cases), Enterococcus (8 cases), Acinetobacter (11 cases), E-Coli (11 cases), Candida (4 cases), Proteus (2 cases), and Salmonella, Streptococcus pneumonia, Monilia, and Seriata one case for each. The most commonly isolated organism was Klebsiella: it was sensitive to Imipenem followed by Amikacin, Nitrofurantoin, Piperacillin, Ciprofloxacin, Co-trimoxazole, Chloramphenicol, Tetracycline, Azithromycin and Cefotaxime. Microbio- logical surveillance of burn patients with sepsis or suspicion of having sepsis over a period of 9 years in our hospital has shown that the most common microorganism isolated from blood cultures was Klebsiella. Kleb- siella was sensitive to Imipenem mainly according to sensitivity testing using the disk diffusion method.
The research aims to identify the digital repository of the University of Baghdad, explain its features, how to register, explaining the mechanism for adding and retrieving research. In addition to identifying the number of people registered in and the number of intellectual outputs stored in it. The descriptive approach and survey methods were adopted by visiting the repository's website and the websites of the University of Baghdad's formations during the period (1-6/4/2024). The theoretical framework included an explanation of the concept of the digital repository, the importance of repositories, their features, and types, with reference to models of Iraqi, Arab, and foreign university digital repositories. The practical framework of the
... Show MoreBig developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological, and the cost accounting has benefited from this technology to development its goals in the regulatory process through the use of non-destructive evaluation perspective in carrying out its functions and to provide appropriate assistance for the use of the products, which were traditional accounting does not take them into consideration. The research aims to a statement that the u
... Show MoreThe steady consumption of fish led many researchers to study it preferences over other foods, especially for radioactivity content. The specific activity concentration (S.A) of natural occurring radioactive materials (NORM) have been measured for Cyprinus carpio fishes collected from several industrial fishes' lakes located in Baghdad governorate using gamma spectroscopy doped with high purity germanium coaxial detector (HPGe). Thirteen fishes' samples were collected from industrial lakes, three samples were collected from cages, and two samples were collected from Trigger River. The last two types of samples were collected in order to compare the results with it. The measured overall averages of S.A for Ra-226, Th-232, and K-40 were 58.
... Show MoreKinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreLower extremity exoskeletons can assist with performing particular functions such as gait assistance, and physical therapy support for subjects who have lost the ability to walk. This paper presents the analysis and evaluation of lightweight and adjustable two degrees of freedom, quasi-passive lower limb device to improve gait rehabilitation. The exoskeleton consists of a high torque DC motor mounted on a metal plate above the hip joint, and a link that transmits assistance torque from the motor to the thigh. The knee joint is passively actuated by spring installed parallel with the joint. The action of the passive component (spring) is combined with mechanical output of the motor to provide a good control on the designed exoskeleton whi
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More