Choosing antimicrobials is a common dilemma when the expected rate of bacterial resistance is high. The observed resistance values in unequal groups of isolates tested for different antimicrobials can be misleading. This can affect the decision to recommend one antibiotic over the other. We analyzed recalled data with the statistical consideration of unequal sample groups. Data was collected concerning children suspected to have typhoid fever at Al Alwyia Pediatric Teaching Hospital in Baghdad, Iraq. The study period extended from September 2021 to September 2022. A novel algorithm was developed to compare the drug sensitivity among unequal numbers of Salmonella typhi (S. Typhi) isolates tested with different antibacterials. According to the proposed algorithm, the predicted resistance values were more valid than the observed values. This proposed algorithm is expected to help the hospital antibiotic policy committee recommend the proper antibacterial agents for S. Typhi and further bacterial isolates.
In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show More(phen) (L(M [formula general a with complexes ligand-mixed new of series A methods analyses different by characterised and synthesised been have ,ligand arysecond as phenanthroline1,10- = phen and ligand primary as dithiocarbamate-1-azolebenzoimid-H-1)sulfinyl)methyl)yl-”-2pyriden)trifluroethoxy2,2,2- “(-4-methyl3-(((2-Sodium = L,ZnIIandCdII,CuII,NiII,CoII= M where,Cl)]phen)(L(Pd [Cland]2)O2H( ligands to metal ,moments magnetic and ,elementalanalysis ,spectrum mass ,surementsmea conductivity ,analysis thermal ,spectroscopy Vis-UV ,IR-FT ,NMR-C,13 H1 such dithiocarbamate the with formed coordination anisobidentate that showed spectra IRFT The.)phen:dithiocarbamate:M) (1:1:1(be to found been has complexes all in ratio nitrogen th
... Show MoreNew Schiff bases derivatives [IV]a-e is prepared via condensation of Derythroascorbic acid with p-substituted aldehydes in dry benzene. To obtain these derivatives, the 5,6-O-isopropylidene-L-ascorbic acid[I] was chosen as starting material, compound prepared from the reaction of L-ascorbic acid as starting material. Compound[I] was prepared from the reaction of L-ascorbic acid with dry acetone in the presence of hydrogen chloride. The esterification of hydroxyl groups at C-2 and C-3 positions with excess ofethyl α –chloroacetate in the presence of sodium acetate produce acorresebonding ester [II] , which was condensed with hydrazine hydrate to give new hydrazide [III] . The new Schiff bases [IV]a-e were synthesized by reaction of acid h
... Show More