Around fifty isolates of Salmonella enterica serovar Typhi were isolated from blood specimens of patients referring to several hospitals in Kirkuk province, Iraq. The results revealed that all isolates developed resistance to trimethoprim-sulfamethoxazole and chloramphenicol. However, neither sul2 nor tem genes were detected. Moreover, only ten isolates were positive for catP. Our data suggested participation of other genes or mechanisms allow these multidrug isolates to resist the antibiotics in question.
Key components estimated in Acol total plant leaves and the results were as follows plant Acol humidity 72%
Background: Oral lichen planus is one of the most common dermatological diseases presenting in the oral cavity. Hence, viral infection of the oral mucosa may be involved in the pathogenesis of oral lichen planus, Taking in to consideration the oncogenic potential of HSV-1, this study aimed to assess the presence of Herpes Simplex Virus type one by direct immunoflourescent in oral lichen planus. This study aimed to assess the presence of HSV type1 by direct immunofluorescent in histopathologically diagnosed OLP Material and Method: Twenty formalin fixed embedded tissue blocks of oral lichen planus with 2 Positive control cases were taken from patients having infection with herpes labialis, US Biological herpes simplex virus-1 Glycoprotein
... Show MoreBackground: Oxidative stress is a deleterious process that can be an important mediator of damage to cell structures and consequently various disease states. Exposure to free radicals from a variety of sources has led organisms to produce a series of defense mechanisms. The antioxidant ceruloplasmin is a copper-containing ferroxidase that can oxidize ferrous iron (Fe2+) to its nontoxic ferric (Fe3+) form. Ferrous iron (Fe2+) is extremely damaging because of its ability to generate toxic free radicals. Oral lichen planus (OLP) is a chronic inflammatory oral mucosal disease of unknown etiology. Previous studies reported that reactive oxygen species may be involved in the pathogenesis of lichen planus. The aim of this study was to estimate the
... Show MoreObjectives: Osteoporosis (OP) is a systemic skeletal disorder characterized with bone mass loss and microstructure, resulting in fragility fractures. Continued secretion of Osteopontin (OPN), osteonectin (ON), osteocalcin (OCN), Parathyroid hormone (PTH) and Ca+2 lead to bone remodeling disorders, followed by bone loss and osteoporosis (OP). The current study aims to investigate the biochemical proteins OPN, OCN, and ON in postmenopausal women with osteoporosis and determine whether we could use them as good indicators for OP diagnostics. Materials and Methods: Case- control study carried out between December 2022 and July 2023. OP disease was confirmed among 108 Iraqi postmenopausal women randomly selected from different Iraqi hospitals, B
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More