One hundred twelve urine samples were collected from Baghdad hospitals and examined by different identification techniques. Seventy isolates (62.5%) were diagnosed as Escherichia coli after microscopic and cultural identifications. The result of PCR product electrophoresis on the isolates showed that thirteen isolates (18.57%) have Pap E gene which are uropathogenic E. coli. Antibiotic susceptibility test was done, and four high resistant strains were mixed with aqueous extract of Quercus infectoria plant in 96 well ELISA plate and incubated for different times. After 0, 6, and 12 hr. of incubation, the effect of the plant extract on the bacterial growth was determined by ELISA reader, and the effect on the expression of Pap E gene was examined by real-time PCR. The results were showed that the higher effect of the extract was on the E10strain growth that dropped from 3.184 at zero time of incubation to 2.378 and 2.281 after 6, and 12 hrs. of incubation respectively. Also, shown a downregulation in the expression of Pap E gene of the isolates at different times of incubation. TheE10 strain shows decrease in the fold from 1 before the treatment with the extract to 0.076 at zero time of incubation with the extract, after 6 and 12 hrs. of incubation it shows a total down-regulation of the gene.
The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreIn this paper, we introduce the concept of e-small M-Projective modules as a generalization of M-Projective modules.
Cholesteryl ester transfer protein gene contains some single nucleotide polymorphisms, which have been associated with serum high-density lipoprotein concentration and other lipoproteins. This study is done for determining of cholesteryl ester transfer protein polymorphism and evaluate its effect on serum lipid profile concentrations in some hyperlipidemic patients compared with healthy subjects in Salah Al-din governorate-Iraq. Blood samples were taken from (90) patients suffering from hyperlipidemia, and (70) samples that were apparently healthy controls. Serum lipid concentrations were measured by enzymatic assays. The polymorphism was genotyped using polymerase chain reaction restriction fragment length polymorphism analysis.&n
... Show MoreFace recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show MoreA description of the implementation of integrated practical work in a remote laboratory was presented in this paper. The student, in real time, can access an online web page in order to manipulate a practical work of digital electronics. This work is based on the use of an embedded system PcDuino. The hardware architecture and software solutions are described, as well as the supervision tool that allows the student to follow changes in the output states of the Practical Work remotely.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreThe research deals with an evolutionary-based mutation with functional annotation to identify protein complexes within PPI networks. An important field of research in computational biology is the difficult and fundamental challenge of revealing complexes in protein interaction networks. The complex detection models that have been developed to tackle challenges are mostly dependent on topological properties and rarely use the biological properties of PPI networks. This research aims to push the evolutionary algorithm to its maximum by employing gene ontology (GO) to communicate across proteins based on biological information similarity for direct genes. The outcomes show that the suggested method can be utilized to improve the
... Show MoreGlobal services with an agent or a multi-agent system are a promising and new research area. However, several measures have been proposed to demonstrate the benefits of agent technology by supporting distributed services and applying smart agent technology in web dynamics. This paper is designed to build a Semantic Web on the World Wide Web (WWW) to enhance the productivity of managing electronic library applications, which poses a problem to researchers and students, represnted by the process of exchanging books from e-libraries, where the process is slow or the library needs large system data.