Uropathogenic specific protein is a genotoxic protein targeting the DNA, leading to mutations and modifications in the normal cell's DNA and subsequently, cancer development. This study aims to determine the prevalence of the usp gene in Uropathogenic Escherichia coli isolated from females with urinary tract infections and study its correlation with biofilm formation. One hundred and five urine specimens were collected from female patients (20 to 55 years old) with urinary tract infections attending hospitals. Traditional laboratory methods using selective and differential culture media were used for initial bacterial isolation and identification, and molecular techniques that targeted a segment of the 16SrRNA gene with a specific primer pair were used to confirm the bacterial identification and usp gene detection using a conventional polymerase chain reaction. A microtiter plate method was used to assess the ability of isolates to produce biofilm. The bacterial isolation and identification results revealed (54.28%, 57/105) of isolates were Escherichia coli. The results of molecular detection of the usp gene revealed a considerable prevalence (98.2%, 56\57) in Uropathogenic Escherichia coli and a 100% ability to form a biofilm. The isolates exhibited different biofilm formation abilities, with a higher ability to form strong biofilm (42%, 24/57) followed by moderate and weak biofilm formation (35%,20/57) and (23%, 13/57), respectively. However, no statistical correlation between the usp gene and different abilities for biofilm formation has been found. The study’s limitation is that there is a small number of specimens due to the difficulty in specimen collection. In conclusion, the high prevalence of the usp gene in Uropathogenic Escherichia coli, although it does not correlate with biofilm, suggests its essential role in bacterial pathogenicity and the possibility of cancer disease in females with UTIs.
The mixed ligand complexes of Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II) with alanine and 8-hydroxyqinoline (Oxine) were synthesized and characterized by FT-IR ,spectra electronic, flam-AAS] along with conductivity measurements , solubility , melting point, magnetic susceptipibility.The synthesized complexes were tested in vitro for antimicrobial activity. The results obtained indicated that some of these complexes are more active than with others.
Salicylaldehyde was react with 4-amino-2,3-dimethyl-1-phenyl-3-pyrazoline-5-on to produce the Schiff base ligand 2,3-dimethyl-1-phenyl-4-salicylidene-3-pyrazoline-5-on (L). The prepared ligand was identified by Microelemental Analysis, and FT.IR, UV-Vis spectroscopic techniques. A new complexes of Fe(III),Co(II),Ni(II),Cu(II),Ce(III) and Pb(II) with mixed ligands of dithizone (DTZ) and Schiff base were prepared in aqueous ethanol with a 2:2:1 M:L:DTZ. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. In addition biological activity of the ligands and complexes against two selected type of bacteria
... Show MoreThe reaction of starting materials (L-asCl2):bis[O,O-2,3;O,O-5,6-(chloro(carboxylic) methylidene)]- -L-ascorbic acid] with glycine gives new product bis[O,O-2,3,O,O-5,6-(N,O-di carboxylic methylidene N-glycine)-L-ascorbic acid] (L-as-gly) which is isolated and characterized by, Mass spectrum UV-visible and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the (L-as-gly) with M+2; Co(II) Ni(II) Cu(II) and Zn(II) has been characterized by FT- IR , Uv-Visible , electrical conductivity, magnetic susceptibility methods and atomic absorption and molar ratio . The analysis showed that the ligand coordinate with metal ions through mono dentate carboxylic resulting in six-coordinated with Co(II) Ni(II) Cu(II) ions while with
... Show More11-22 Description An apology may be defined as “the act of declaring one’s regret, remorse or sorrow for having insulted, failed, injured, harmed or wronged another (Internet Encyclopedia of Philosophy IEP). A definition quite interested in the function suggests that “an apology is a speech act addressed to B’s face–needs and intended to remedy an offence for which A. takes responsibility.”(Holmes, 1990: 159). Apologies are also" speech acts" that are hard to identify, define or categorize, a difficulty that arises directly out of the functions they perform (Lakoff, 2001: 201) and the forms they take. In function, they range from selfabasement for wrongdoing to the formal display of appropriate feeling. In form, they range from
... Show MoreBackground: The oral cavity is considered as a complex ecological niche, its complex microbial community is reflected to it. Streptococcus mutans has been implicated as one of the major etiological factor of dental caries. Tooth surfaces colonized with Streptococcus mutans are at a higher risk for developing caries, while lactobacilli are considered as the secondary invaders, not initiators of the carious lesion. The main purpose of this study was to correlate the dental caries (for primary and permanent teeth) in the upper jaw with the streptococcus mutans and lactobacilli count in the dental plaque and saliva, also to correlate the dental caries (for primary and permanent teeth) in the lower jaw with the streptococcus mutans and lactobaci
... Show MoreBACKGROUND: The degree of the development of coronary collaterals is long considered an alternate–that is, a collateral–source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty.
House 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi
Baghdad governorate has many areas of distinctive architectural and architectural character, which are heritage and valuable areas that we must preserve and take care of. But we see many manifestations of it, which have a negative impact on buildings, areas and roads, so that they distort the view and thus lead to visual pollution in general. The research examined the visual pollution from random advertising, which stretched buildings, walls, electricity poles and sidewalks. The study covered different areas of al-Karkh and al-Rassafa (Jadreya Bridge, Nation Square, Jordan Square, alkindy Street)Most of the distortions were the result of non-removable posters, Handwriting, election candidate adve
... Show MoreThis paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show More