Background: Chronic suppurative otitis media (CSOM) is the result of aninitial episode of acute otitis media and is characterized by a persistent discharge from the middle ear through a tympanic perforation for at least 2 weeks duration. It is an important cause of preventable hearing loss, particularly in the developing world.Methods. 1. To get an overview on the bacterial ear infection profile in general 2. To assess the antibiotic resistance of Pseudomonal infection (PS) particularly since it is usually the commonest infection to cause otitis media and the most difficult to treat due to the problem of multi drug resistance... A cross sectional study was done which included 405 patient of CSOM patients196 (48%) case were males ,209 (52%)case were females. Swabs for aural discharge was taken from those patients. Discharge is cultured by inoculating it into blood , MacConkey agar , chocolate agars and Sabouraud agar (for fungi).If the isolate shows to be Pseudomonas isolate growth then another culture of the isolate is performed on Muller Hinton Agar. Then the antibiotic susceptibility and resistance of Pseudomonas isolate is assessed by (Kirby-Bauer Method)Results:196 (48%) case were males.209 (52%) case were females with a male to female ratio 1:1.1150 (73%) cases were infected with Pseudomonas species (PS) The sensitivity of the Pseudomonas isolates to the following antibiotics is shown below:Amikacin 91.7%Imipenem 89.7%Ceftazidime 81.8%Ciprofloxacin 73.7%Garamycin 72.9%Tobramycin 67.7%Ticarcillin 66.7%Cefoperazone 42.9%Conclusions: Pseudomonas species is the commonest microorganism in cases of CSOM.Microbiological identifications and antibiotic resistance determination of pathogens isolated from the middle ear in patients with CSOM not responding to empirical antibiotic treatment gives possibility of the choice of an effective antibiotic and its proper dosage. Cefoperazone ,a relatively new antibiotic that is used in Iraq to combat pseudomonal infections has proven to be poorly effective compared with other previously used antibiotics.
The research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of
... Show MoreW Tarik A, AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 2
Physicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i
... Show MoreBackground: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy
In the South of yement, when the accupation of Aden in 1839 by the British, British politics has proceeded in accordance with interests in promoting the existence and exploitation of this important site to implement their interests. Historians believe that Britain played a major role in the conflicts that have taken place on the land of Yemen, through a series of military and political dealings between them and the Ottoman Empire prior to withdrawal of Yemen and between local authorities and power to Yemen, such interactions have led to very serious consequences for the future of Yemen and Yemen was often divided into three parts, the northern areas under the authority of Imam Yahya, and the South, under the control of Britain, Asir and
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreAbstract:
The achievement of agricultural development provide food security and to form a basis for economic growth and comprehensive social, requires a number of actions to overcome the obstacles and problems facing the development of this economic sector, to make it able to achieve food security and operation of the workforce, and reduce dependence on the outside in the provision of food peripherals, and so it is only available through the highest degree of efficiency and economic mobilization of resources, so most of the developed and developing countries alike seek to achieve sustainable agricultural development tobacco meet the food requirements and good jobs for c
... Show More