The use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 from Al-kadhimiya hospital, 86% were female and 32% were male, their age range was 40 +/- 15. The study shows that there are medication errors related to different causes: firstly, medical team error which include the nurse (70.9%) and the physician which include 1) delay in patient follow up after operation(5.9%) , 2) changing the AB without doing culture and sensitivity test (48.8%), and incomplete prescription order(13.1%). second: ordering error which include: 1) the absent of original source of AB (44.5%), 2) Error in availability of the chosen AB (74.8%), and third: error related to the patient itself include 1) socioeconomic situation (14.5%), 2) educational state (54.3%), finally error related to increase cost in dispensing more than one AB needed (80.1%), although the healing was (63.6 %), delay in response (25%) and complicated wound infection (5%), significant results were arrange nurse error and poor drug availability. In conclusion: medication errors are still common problem in our hospitals, which are mostly related to medical team and the pharmacists should give more effort to avoid these errors. Key wards: Acquired error, Antibiotic, Surgery patients.
Water hyacinth (Eichhornia crassipes) is a free-floating plant, growing plentifully in the tropical water bodies. It is being speculated that the large biomass can be used in wastewater treatment, heavy steel and dye remediation, as a substrate for bioethanol and biogas production, electrical energy generation, industrial uses, human food and antioxidants, medicines, feed, agriculture, and sustainable improvement. In this work, the adsorption of Congo Red (CR) from aqueous solution onto EC biomass was investigated through a series of batch experiments. The effects of operating parameters such as pH (3-9), dosage (0.1-0.9 g. /100 ml), agitated velocity (100-300), size particle (88-353μm), temperature (10-50˚C), initial dye
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreSolar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ
... Show MoreUsing remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST
Array antennas have an interesting role in the radio astronomy field. The array antennas allow astronomers to obtain high-resolution signals with high sensitivity to weak signals. This paper estimates the meteors' positions entering the Earth's atmosphere and develops a simulation for array antenna radar to analyze the meteor's echoes. The GNU radio software was used to process the echoes, which is a free open-source software development toolkit that provides signal processing blocks to implement in radio projects. Then, the simulation determines the azimuth and elevation of the meteors. An improved Multiple Signal Classification (MUSIC) algorithm has been suggested to analyze these echoes. The detected power of each meteor echo has
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThe purpose of this research is to test the ability of the true strength index To time and manage trading in the financial market to select the best stocks and achieve a higher return than the Simple buy and hold strategy. And To achieve the objectives of the research, it relied on the main hypothesis, which is By using the True Strength Index to manage trading decisions buying and selling, can be achieved higher returns than the buy and hold strategy . The research community has been identified with all stocks listed on the Iraq Stock Exchange. Implementing the financial research tests requires selecting a sample from the research community that fulfills the test requirements according to a number of conditions So (38) companies we
... Show MoreAbstract:Two-dimensional crystal has been achieved and controlled with the aid of DC electric field applied between two electrodes at 5 millimeters separating distance between them. Sol-gel method has been used to prepared nanosilica particle which used in this work as well as TiO2 nanopaowder. The assembly of the silica particles is due to the interaction between the electrical force, the particles dipole, and the interaction between the particles themselves. When a DC voltage is applied, the particles accumulated and crystallized on the surface between the electrodes. The Light diffraction demonstrates that the hexagonal crystal is always oriented with one axis along the direction of the field. The particles disassemble when the field is
... Show MoreThis investigation aimed to explain the mechanism of MFCA by applying this method on air-cooled engine factory which was suffering from high production cost. The results of this study revealed that MFCA is a useful tool to identify losses and inefficiencies of the production process. It is found that the factory is suffering from high losses due to material energy and system losses. In conclusion, it is calculated that system losses are the highest among all the losses due to inefficient use of available production capacity.