Background: The skin functions as a barrier to the external environment, damage to this barrier following a burn disrupts the innate immune system and increases susceptibility to bacterial infection. Objective: This study was carried out to determine the bacterial isolates and study their antimicrobial susceptibility in burned wound infections at one burn's hospital in Baghdad.Type of study:Cross-sectional study.Methods: The bacteria were identified at species level by using Analytic Profile Index (API) system and The antimicrobial susceptibility test was performed according to Kirby-Bauer (disk diffusion) technique.Results: Over a period of one year (from October 2014 to October 2015). Out of 848 patients with different degrees of burns, 186 (19.81%) positive bacterial isolates. Out of 186 bacterial isolates, the isolation rate of Gram positive was 14(7.53%) and Gram negative isolates was 172(92.47%). From those 172 Gram negative bacteria the most frequently isolated bacteria was Pseudomonas aeruginosa 60(32.26%) isolates followed by Acinetobacter baumannii 40(21.51) and all Gram positive bacteria were Staphylococcus aureus 14(7.53). The most effective antibiotic on Staphylococcus aureus isolates was Vancomycin (sensitivity rate was 11(92.86%)), while the highest resistance was to Penicillin and the rate of resistance was 14(100%) followed by Ampicillin 12(85.71%). The most effective antibiotic on Gram-Negative isolates was Imipenem (sensitivity rate was 165(95.93%)) followed by Amikacin (sensitivity rate was 146(84.88%)). On the other hand the Gram negative bacteria in this study were mostly resistant to Ampicillin 164(95.35%) and Amoxicillin-Clavulanic acid 157(91.28). Acinetobacter baumannii and Klebsiella pneumoniae isolates were the mostly resistant isolates than other gram negative bacteria under this study.Conclusion: Pseudomonas aeruginosa was the most frequently isolated bacteria among gram negative bacteria and the most effective antibiotics on Gram-Negative and Staphylococcus aureus isolates were Imipenem and Vancomycin, respectively.
The present study investigates the effect of the de-sanding (recycling system) on the bearing capacity of the bored piles. Full-scale models were conducted on two groups of piles, the first group was implemented without using this system, and the second group was implemented using the recycling system. All piles were tested by static load test, considering the time factor for which the piles were implemented. The test results indicated a significant and clear difference in the bearing capacity of the piles when using this system. The use of the recycling system led to a significant increase in the bearing capacity of the piles by 50% or more. Thus it was possible to reduce the pile length by (15 % or more) thus, and implementation costs
... Show MoreThe study presents the performance of flexural strengthening of concrete members exposed to partially unbonded prestressing with a particular emphasis on the amount (0, 14.2, and 28.5%) of cut strands-symmetrical and asymmetrical damage. In addition to examining the influence of cut strands on the remaining capacity of post-tensioned unbonded members and the effectiveness of carbon fiber reinforced polymer laminates restoration, The investigated results on rectangular members subjected to a four-point static bending load based on the composition of the laminate affected the stress of the CFRP, the failure mode, and flexural strength and deflection are covered in this study. The experimental results revealed that the usage of CFRP la
... Show MoreThe emergence of SARS-CoV-2, the virus responsible for the COVID-19 pandemic, has resulted in a global health crisis leading to widespread illness, death, and daily life disruptions. Having a vaccine for COVID-19 is crucial to controlling the spread of the virus which will help to end the pandemic and restore normalcy to society. Messenger RNA (mRNA) molecules vaccine has led the way as the swift vaccine candidate for COVID-19, but it faces key probable restrictions including spontaneous deterioration. To address mRNA degradation issues, Stanford University academics and the Eterna community sponsored a Kaggle competition.This study aims to build a deep learning (DL) model which will predict deterioration rates at each base of the mRNA
... Show MoreThe research aims to shed light on the amount of proceeds annual tax for each of the way the contract total and percentage of completion method - see which is better - as well as the current problems arising from the application method of the contract in full in settling accounts tax - to identify problems - related to postpone settling accounts tax in accordance with the way the contract fully and determine the advantages and disadvantages of each of the methods through practical application , and then use the results as inputs to help in the decision to confirm the continuation of the GCT using a full decade in settling accounts tax for long-term construction contracts or forgo them.
Were the result of research the existence of
... Show MoreWithin this research, The problem of scheduling jobs on a single machine is the subject of study to minimize the multi-criteria and multi-objective functions. The first problem, minimizing the multi-criteria, which include Total Completion Time, Total Late Work, and Maximum Earliness Time (∑𝐶𝑗, ∑𝑉𝑗, 𝐸𝑚𝑎𝑥), and the second problem, minimizing the multi-objective functions ∑𝐶𝑗 + ∑𝑉𝑗 +𝐸𝑚𝑎𝑥 are the problems at hand in this paper. In this study, a mathematical model is created to address the research problems, and some rules provide efficient (optimal) solutions to these problems. It has also been proven that each optimal solution for ∑𝐶𝑗 + ∑𝑉𝑗 + 𝐸𝑚𝑎𝑥 is an effic
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreWe study in this paper the composition operator of induced by the function ?(z)=sz+t where , and We characterize the normal composition operator C? on Hardy space H2 and other related classes of operators. In addition to that we study the essential normality of C? and give some other partial results which are new to the best of our knowledge.