The Present investigation includes the isolation and identification of Pseudomonas aeruginosa for different cases of hospital contamination from 1/ 6/2003 to 30/9/2004, the identification of bacteria depended on morphological , cultural and biochemical characters, 37 of isolates were diagnosed from 70 smears from wounds and burns beside 25 isolates were identified from 200 smears taken from operation theater and hospital wards including the floors , walls , sources of light and operation equipment the sensitivity of all isolates to antibiotic were done , which exhibited complete sensitivity to Ciprofloxacin , Ceftraixon, Tobromycin and Gentamysin ,while they were complete resist to Amoxcillin , Tetracyclin , Nitrofurantion , Clindamycin Cefotoxam and Methoprim.
This study aimed to evaluate the effect of the COVID-19 outbreak on emergencies and pain among orthodontic patients attending a teaching hospital. The study was conducted among orthodontic patients receiving active orthodontic treatment or in a retention period at the College of Dentistry, University of Baghdad, Iraq. Their participation was voluntary, and they filled out an Arabic-translated questionnaire. The survey included general information, orthodontic problems, and a numerical rating scale for pain assessment. We used descriptive and inferential statistics (frequencies and intersecting frequencies), chi-square test and linear regression. Out of 75 orthodontic patients, only 54 (15 males and 39 females) were included in the s
... Show MoreAims: This study aimed to assess complications of caesarean section among pregnant women attending AL Diwaniyah Maternity and Pediatric Hospital; and find out relationship between complications of caesarean section and socio-demographic data of women. Methods: A descriptive cross-sectional study design is conducted for the period of December 26th 2020 to June 1st 2021. The validity of the questionnaire is determine through a panel of experts and reliability was achieved through a pilot study. By a purposive sample is selected among pregnant women who undergo caesarean section, data was collected through the use of questionnaire and interview techniques; and analyzed through the descriptive and inferential statistic. Results: Findings indica
... Show MoreObjectives: To determine the effectiveness of the educational program on nursing staff knowledge about infection control measures at the Intensive Care Unit in Al-Diwaniya Teaching Hospital.
Methodology: A pre-experimental design (one group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from ( 20th February to 5th March, 2020) on a non-probability (purposive) sample consisting of (25 nurses) working in ICU. A questionnaire was built as a data collection tool and consisted of two parts:
First part: The demographic characteristics of the nursing staff (age, gender, level of education, years of experien
... Show MoreHospitals are part of the service organizations and most importantly at the level of individuals because they are tied to the people health and their daily lives , the nursing service is one of the important services provided by hospitals, and nurses are the human resource that offers this service, from this standpoint the idea of research came to prepare work Scheduling for nurses in a scientific way to improve performance operational for their services and provide efficient service available 24 hours a day, the research use one of the modern and scientific rules of scheduling its “schedule of
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More