For the period from February 2014 till May 2014, one hundred and nine lactose fermenter clinical isolates from different samples (urine, stool, wound swab, blood, and sputum) were collected from Alyarmok, Alkadimiya, and Baghdad teaching hospitals at Baghdad governorate. Identification of all Klebsiella pneumoniae isolates were carried out depending on macroscopic, microscopic characterizations, conventional biochemical tests, and Api 20E system. Fifty-three (48.62%) isolates represented K. pneumoniae; however, 51.73% represented other bacteria. Susceptibility test was achieved to all fifty-three K. pneumoniae isolates using five antibiotic disks (Ceftazidime, Ceftriaxone, Cefotaxime, Imipenem, and Meropenem). Most of tested isolates (90.5% and 77.3%) were susceptible to Meropenem and Imipenem, respectively and less susceptible to third generation Cephalosporin. Carbapenemase production was detected by the modified Hodge test, five carbapenem resistant K. pneumoniae isolates (K2, K3, K4, K34, and K35) gave positive results. In the other part in this study, detection of blaKPC gene by pcr techinique was carried out on all fifty-three K. pneumonie isolates. Even though five isolates gave positive modified Hodge test, only one isolate (K2) gave specific identification for blaKPC gene.
The preliminary test of the compounds N [2– (3,4–dimethoxy nitrobenzene oxazepine– 2,3–dihydro–4,7–dione]–5–mercupto–2–amino–1,3,4–thiadiazol [A] and N [ 2–anthralidene– 5– ( 2–nitrophenyl ) –1,3–oxazepine–4,7–dione–2–d](5–mercapto–1,3,4–thiadiazole–2–amin) [B] , showed that they possess high activity against some positive and negative bacteria , like pseudomonas aeruginosa (pseudo.), Escherichia coli (E-coli), staphylococcus aureus (sta.) and Bacillus subtilis (Ba.) and finally there is a study of the effect of some antibiotics like streptomycin (S), gentamycin (GN), chloramphenicol (C) and Nalitixic acid (NA) in order to compare the differences in effects. In the present study, results
... Show MoreAccess to high-quality neurosurgery online learning is limited in low- and middle-income countries, and Iraq is part of this category. The need for collaboration and connection of people worldwide to exchange ideas and experiences in neurosurgery is a challenge. Surgical Neurology International® (SNI)/SNI Digital stimulated the establishment of the joint effort to bring the discussion about the best experiences in neurosurgery from the United States and Iraq together in an internet meeting format.
An online survey was formulated and distributed to the attendees of the SNI-Baghdad neurosurgery
teen sites Baghdad are made. The sites are divided into two groups, one in Karkh and the other in Rusafa. Assessing the underground conditions can be occurred by drilling vertical holes called exploratory boring into the ground, obtaining soil (disturbed and undisturbed) samples, and testing these samples in a laboratory (civil engineering laboratory /University of Baghdad). From disturbed, the tests involved the grain size analysis and then classified the soil, Atterberg limit, chemical test (organic content, sulphate content, gypsum content and chloride content). From undisturbed samples, the test involved the consolidation test (from this test, the following parameters can be obtained: initial void ratio eo, compression index cc, swel
... Show MoreAbstract:
This research aims to identify the type of cultural values prevailing in the Ramadi General Hospital, and Baghdad, educational, and whether the organization's culture values play a role in improving the quality of nursing care service in hospitals, and how different cultural values of the nurses between Ramadi Teaching Hospital and General education Baghdad Hospital because of the nature social and cultural Different each region, including the research sample of all nurses working in Baghdad Teaching Hospital, and Ramadi educational-General, adopted Find descriptive analytical approach adopted scale developer (Hofstede, 1991) and (Furrer et al, 2000) And pres
... Show MoreDuring the last two decades at least, increased interest in Social attraction variable by scientists in psychology and sociology, to multi-dimensional and its association with psychological and emotional variables , and what are of importance in the process of human communication , leadership, and social relations.
Social psychologists interested in social attraction also so its relation with social influence , political and occupational .
"Social attraction defined as "individual ability functioned his skills in at
Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More