Background: Candida tropicalis is one of the most causes of vulvovaginal candidiasis (VVC) in women. Systemic candidiasis and candidemia may also occur in pregnancies. Objective: This study was carried out to detect and isolate of this yeast from aborted placenta, which may cause severe complications such as spontaneous abortion. Materials and methods: Fresh aborted placenta were collected and washed by normal saline to remove the blood. Then, cut it into portions and place it in test tube containing 5 ml of normal saline. Finally, shake for 10 minutes, after that, cultured for microbial isolation. Isolation and detection were done by some conventional methods with Api candida and CHROMagar. Results: The results showed that four isolates of C. tropicalis (2%) were isolated from two hundreds samples from placenta of aborted women. Conclusions: Even with its rare occurrence, C. tropicalis has the ability to initiate intrauterine infection.
Cosmetic products must be safe for use by consumers , It is also regulated and required the legislation of countries all over the world . In this study out of 80 cosmetic products analyzed and 32.5% were found to be contaminated .Products such as mascara, lip pencil and eye pencil were analyzed . The contaminants including bacteria such as Staphylococcus aureus , Staphylocoocus epidermidis , Pseudomonas aeruginosa , Escherichia coli and Klebsiella pneumonia which were ranging in number from (103-104 ) C.F.U. /ml and fungi such as Penicillium spp. , <
... Show MoreIraqi legislator taxation married women in charge of the income tax treatment of the man in charge of tax and the application of the principle of equality of individuals to bear public burdens. The factor legislator women in charge of special treatment in some cases, taking into account the circumstances family allow tax in the case of whether she was married to a man is unable to completely work and does not have a resource, as well as giving the legislator allow for her children. it observed that the amount of allowing still little is notcommensurate with the high cost of living in addition to limiting the tax allowances granted within the limits of the taxpayer and his immediate family did not take the legisla
... Show MoreThe aim of this paper is to determine the significant levels of some heavy metals such: lead, chromium, nickel and cadmium, were determined. Sources of pollution and their distribution according to presence of elements in the soils over the whole zone of the province of Maysan in southern of Iraq were investigated 36 soil samples from different zones: residential, industrial, commercial, agricultural and main roads, were collected from the soil surface and a depth of 30 cm and analyzed measuring of concentrations for heavy metals by a device ICP-MS technique. The results were compared with global standard levels of these elements in the soil.
The aim of this paper is to identify Nano-particles that have been used in diagnosis and treatment of leishmaniasis in Iraq. All experiments conducted in this field were based on the following nanoparticles: gold nanoparticles, silver nanoparticles, zinc nanoparticles, and sodium chloride nanoparticles. Most of these experiments were reviewed in terms of differences in the concentrations of nanoparticles and the method that was used in the experiments whether it was in vivo or in vitro. These particles used in most experiments succeeded in inhibiting the growth of Leishmania parasites.
- Abstract -
This research tackles one of this nations scholar , was not studied by other researchers . Many of us know nothing about his life , books , arguments in a manner Like other scholars of this nation . Therefore , it is the task of this study , in a response to the favour of Ibn al – Labban on us , to reveal his works .
This study deals with him through four sections . section one investigate his biography , including six sub divisions regarding his name date of birth , Life , his father life , death , and finally , this section concludes with the embarrassment which might a reader face in differentiation between Ibn al – labban and the other respec
... Show MoreAt the beginning of 1935 theMinistry of (Yasin AL-Hashimi) was formed which was the result of the (Sulayikh)Conference .The new ministys policy was towards the authority of the one party and the exclusivity of power.The policy of (Yasin AL-Hashemi)has faced severe campaigns from the AL-Ekhaa and AL-Ahaly newspapers.The new ministry like its predecessor ministries . When it faces criticism from opposition newspapers .its shutting down newspapers and not accepting requests for them. Some opposition newspapers named Yassin AL-Hashemi (the dictator).Iraqi opposition newspapers have been neglected and deprived of press freedom although they were the main factor in educating the community and representing the public opinion of people . Lt appe
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.