Preferred Language
Articles
/
jih-1846
Study of Antibiotic Resistance to Pseudomonas aeruginosa that Iisolate from Burns and Ggeneral Surgery from Al-Yarmouk Teaching Hospital
...Show More Authors

     Pseudomonas aeruginosa is common gram negative rod – shaped bacterium, a species of considerable medical importance, P. aeruginosa is prototypical "multi drug resistant (MDR) Pathogen" that is recognised for its ubiquity, its intrinsically advanced antibiotic resistance mechanisms, and its associatation with serious illnesses – especially nosocomial infection such as ventilator – associated pneumonia and various sepsis syndromes. This study was conducted from March 2014 to July 2014, the patients were males and females. Total samples of 613 patients, selected from burns wards and general surgery wards, the samples were sending to teaching laboratories from the same hospital. The present study showed that the prevalence of sensitivity revealed that amikacin had the highest sensitivity (89,6%), followed by cefotaxime (66.2%), the optimal aminoglycosides in combination therapy with B-lactams was amikacin, followed by tobramycin and gentamycin, highest sensitivity rate showed that (95.2%) was found in the combination of amikacin with imipenem and piperacillin, (71.4%) were amikacin combination with cefotaxime ,(85.7%) were gentamycin with piperacillin , (71.4%) were gentamycin with cefotaxime, (95.2%) were  tobramycin with piperacillin,(76.2%)were tobramycin with carbenicillin, resistance of bacterials associated with reduced aminoglycoside accumulation the current study indicated that pseudomonas aeruginosa  was the most prevalent in burns and general surgery infection, these infections generally require treatment with a combination of antimicrobials inoder to achieve a greater baetericidal effect and reduce the levels of resistance .  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 40% <i>Loranthus europaeus</i> Ointment as an Alternative Medicine in the Treatment of Acute Cutaneous Leishmaniasis versus Topical 25% Podophyllin Solution
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Generalized Regular Continuous Functions In Topological Spaces
...Show More Authors

In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them

View Publication Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Samarra Journal Of Engineering Science And Research
Proposed low Xilinx FPGA power consumption for recursive NOMA applied in optical visible light communication
...Show More Authors

Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref
Publication Date
Thu May 08 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF