In Present study, 25 clinical isolates of Proteus spp. of clinical samples, urine, wounds and burns collected from different hospitals in Baghdad city, all isolates were identified as Proteus mirabilis using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifying as P. mirabilis. The susceptibility of P. mirabilis isolates to cefotaxime was 66.6 %, while to ceftazidime was 20%. Extended spectrum β-lactamses producing Proteus was 30.7 %. DNA of 5 isolates of P. mirabilis was extracted and detection for blaVEB-1 gene by using multiplex polymerase chain reaction (PCR). Results showed that the presence of this gene in all tested isolates, as an important indicator for increasing risk of extended spectrum beta lacatmases resistant P. mirabilis isolates against antimicrobial agents due to its spread recently in Middle and Far East of Asia. Sequencing of DNA nucleotides was carried out with automated sequencer (Macrogen/ Korea) and confirmed that 3 isolates of P. mirabilis have blaVEB-1 gene, while one isolate has blaVEB-3 gene
Complexes of Au(III) ,Pd (II) , Pt (IV ) and Rh(III) with S – propynyle -2- thiobenzimidazole (BENZA) have been prepared and characterized by IR and UV- Visible spectral methods in addition to magnetic and conductivity measurements and micro – elemental analysis (CHN).The probable structures of the new complexes have been suggested.
The current research aims to determine the requirements of Trends of International Mathematics and Science Study (TIMSS 2019) and to find out the extent to which the content of science textbooks for grades (1-4) in the Sultanate of Oman includes the requirements of (TIMSS 2019). Only the Cognitive Process dimension has been considered when conducting the analysis. The study population includes all science books from the first to the fourth grade for the academic year 2021-2022. The study identified and organized the requirements in the study tool, which is a list of requirements of (TIMSS 2019). After confirming its validity and reliability, the analysis was performed, and data were collected and analyzed statistically using frequencies
... Show MoreThe research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city.
Brucellosis is possess a significant public health problem in Baghdad. In this study, we investigated the potential role of the PCR assay in detection of Brucella species, from patients suspect to have brucellosis, using blood samples in both human and animal. To establish a PCR technique for diagnosis of active brucellosis in our samples, DNA extraction was carried out using a commercial kit, and a laboratory extraction procedure. PCR amplification was done using 1 set of primers: B4/B5 for Brucella species. Extraction of Brucella DNA using the commercial kit was successful. The laboratory extraction was successful and more economic. A total of 178 peripheral blood
... Show MoreThe spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the
Background: Metabolic syndrome (Mets) is partially heritable. High mobility group AT-hook1 (HMGA1), an architectural transcription factor, affects the homeostasis of glucose. The marked inter-individual differences between T
... Show MoreFusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentrati
... Show MoreBackground: Phytotherapy is the usage of herbal species with medicinal properties for the management of various diseases. Gingivitis and periodontitis are diseases that involve the role of both the bacteria and the host immune response. Over the years, various researches have shown the importance of herbal products in the management of periodontal diseases. Aims of the study: To evaluate the efficacy of locally applied Salvia officinalis gel as adjunctive in the treatment of chronic periodontitis. Subjects and methods: Fourteen patients (10 males and 4 females) with chronic periodontitis were enrolled in the present study with total number of twenty-eight periodontal pockets utilizing a split mouth design, the pockets were divided i
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the