The antiviral activity of leaf extracts from Datura stramonium and tomato plants inoculated with TMV, combined with 20% skimmed milk, was investigated. A TMV isolate was confirmed using bioassay, serological, and molecular approaches and subsequently used to inoculate plants. Tomato plants, both pre- and post-inoculated with TMV, were sprayed with leaf extracts from either TMV-free or infected plants, alone or mixed with 20% skimmed milk. Enzyme-linked immunosorbent assay (ELISA) using tobamovirus-specific antibodies and local lesion tests were conducted to assess antiviral activity based on virus concentration and infectivity in treated plants. The experiment followed a completely randomized design (CRD), and the Least Significant Difference (LSD) test was applied to evaluate ELISA optical density (OD) values. OD data revealed that the combination treatment (inoculated tomato leaf extract + 20% skimmed milk) inhibited TMV in tomato plants by up to 56%, showing the highest antiviral activity. This study is the first to investigate the antiviral potential of leaf extracts from TMV-infected plants.
This study dealt with the basics of financial inclusion in terms of concept, importance and objectives, The empowerment of women financially and bank ,and then the relationship between financial inclusion and women, and determine the requirements of inclusion Financial resources for women. The analytical descriptive method was used for data, which included reviewing and analyzing information and data in economic and financial literature. The study: reached a number of conclusions, the most important of which are Financial inclusion contributes to women's financial and banking support, as there is a positive relationship between financial institutions Banking and women's access to financial and banking services, thus playing a rol
... Show MoreIraq is Suffering nowadays from the criminal triad represented by the fiscal and administrative corruption, money laundering and terrorism, which are intertwined in a very related relations, as each of them support the other . Since the over growth has been one of its characteristics leaving behind a very dangerous negative effects whether it was social , economic or even political impacts . As a result , this trial is now represents a high risk that threatens the present and the future of Iraq . On the political , economic and social level , it is well to mention that the poor direct investment , the increasing rates of poverty , unemployment , inflation as well as the smuggling of goreign currency an
... Show MoreOut of a total of fifty samples, thirty-five isolates were identified as Serratia marcescens. Thesediverse clinical samples were collected over a three-month period, from October 2023 to December 2023, fromseveral hospitals in Baghdad, including Fatima Al-Zahraa Hospital, Al-Sader Hospital, Ibn Al-Balady Hospital,and Al-Imam Ali Hospital. The clinical samples primarily included urine from patients with urinary tractinfections (UTIs). All isolates were cultured on nutrient agar, MacConkey agar, and blood agar, and theiridentities were confirmed through biochemical testing and the Vitek 2 compact system. Based on phenotypicvirulence factors, the S. marcescens isolates showed varying positive patterns: 32 out of 35 (91.42%) forprotease
... Show More
Detection of virulence gene agglutinin-like sequence (ALS) 1 by using molecular technology from clinical samples (
In the present study, radon gas concentration in the shallow groundwater samples of the Abu-Jir region in Anbar governorate was measured by using Rad-7 detector. The highest radon gas level in the samples is up to 9.3 Bq/L, while the lowest level is 2.1 Bq/L, with an average of 6.44±1.8 Bq/L. The annual effective dose is varied from 33.945 μSv/y to 7.66 μSv/y, with an average of 0.145±0.06 μSv/y. Consequently, the radon level in the groundwater studied is lower than the standard recommended value (11 Bq/L) reported by the United States Environmental Protection Agency (USEPA). The potential source of radon is uranium-rich hydrocarbons that are leakage to the surface along the Abu-Jir Fault. This research did not indicate any ris
... Show MoreThe anatomical study of the epidermis leaflet for seven species and variety wild belonging to the genus Medicago L. species are: M. constricta Dur., M. coronata L., M. intertexta L., M. intertexta.var. ciliaris L., M. laciniata L., M. lupulina L., M. minima L. and M. sativa L. were studied, The search included epidermis characters and stomatal complexes addition to venation system in leaflets. It is revealed through the study, epidermis leaflet type Amphistomatic (the stomata spread on the upper and lower surface) as well as the presence of three types of stomatal complexes namely: Anisocytic (the guard cells surrounded by three unequal cell size), Anomocytic (not differential from subsidiary cells in epidermis) and Anomotetracytic (four ce
... Show MoreBackground: Urinary tract infections (UTIs) and their complications such as Bladder cancer (Bl. C.) are a health growing problem worldwide. Objective: To shed light on this subject, present study was done to investigate relationship between recurrent urinary tract infection (RUTI) due to Escherichia coli (E. coli) and Bl. C.Type of study: Cross-sectional study. Methods: This study included 130 patients with RUTI, 50 patients with Bl. C. and 50 control of both sexes (aged 7-85 years) attending Al-Zahra Teaching Hospital in Al-Kut/Wassit governorate and Al-Harery Teaching Hospital of specialized surgeries/Baghdad. The patients were divided into two groups: the first group (n=130) included those who were suffering from recurrent UTI without
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper