Preferred Language
Articles
/
jkmc-847
A Population based Study on Self Medication Practice in Pakistan
...Show More Authors

Background: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.

Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.

Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected. Data was analyzed by software SPSS version 22.

Results: Out of n=3388 respondents, the prevalence of self -medication practice of OTC drugs and antibiotics as self – medication practice in all of the respondents is 88% and 85.9% respectively. Knowledge of the respondents about the use of the antibiotics as well as side effects of antibiotics was 40.7% and 15.3% respectively. Headache, fever, cough and stomach problem were the minor ailments for which   majority of OTC drugs and antibiotics used respectively. The commonly used OTC drugs and OPDEA were Paracetamol and Omeprazole. The commonly used antibiotics were Metronidazole, Amoxicillin and Clavulanic acid and Ciprofloxacin.

Conclusion: Government should make policies to train pharmacist in the community for antibiotics stewardship and standard treatment guidelines through educational workshops. Our future study will be on how to minimize antimicrobial resistance in the developing countries

  1.  Conclusion: Government should make policies to train pharmacist in the community for antibiotics stewardship and standard treatment guidelines through educational workshops. Our future study will be on how to minimize antimicrobial resistance in the developing countries.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Low computations in compression image schemes using Cache codebook based on Weber's law
...Show More Authors

In this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.

View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
A Numerical Study on Cross Diffusion Cattaneo-Christov Impacts of MHD Micropolar Fluid Across a Paraboloid
...Show More Authors

Analyzing the impacts of Cattaneo-Christov flux, bioconvective Raleigh number and cross diffusion effects in electrically conducting micropolar fluid through a paraboloid revolution is assessed in this work. Non-dimensional equations are solved numerically using shooting technique with an aid of Matlab software. The impact of various parameters on velocity, temperature and concentration are discussed in detail and presented graphically. Harman number and micro rotation parameters are found and have an increasing influence on shear stress. The vertical velocity increases at free stream and the horizontal velocity increases near the surface when Grb increases, which follows the opposite trend for accumulation of Rb. T

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Effect of a Parked Car Orientation on a Temperature Distribution and Cooling Load Calculation: Experimental Study
...Show More Authors

When a vehicle is left parked in the sun for an extended period, the gathered heat causes damage to several interiors within the cabin and causes discomfort for people and animals left inside the car. In the present work, the effect of the orientation of a parked white minibus on temperature distribution and cooling load calculation is studied experimentally in an open environment. Two different cases were studied facing south and facing east. For several hours, the temperature inside the car cabin had been monitored and measured at five separate locations. The cooling load calculations are carried out based on the experimental measurements. The results show that the overheating of parked cars always happens as a result

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Applied Energy
Hourly yield prediction of a double-slope solar still hybrid with rubber scrapers in low-latitude areas based on the particle swarm optimization technique
...Show More Authors

View Publication
Scopus (29)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref