Aim: The study aimed to investigate the presence of the specific B1 gene T gondii in blood and milk samples from natural infected cattle and pregnant women (16-30 weeks) whose examination performed by the officers at the women's and children's Educational hospital in Al-Diwaniyah, Iraq. Materials and methods: A total of 150 serum samplings were collected analysed and scanned for Anti-T gondi antibodies (75 naturally-infected goats and 75 pregnant women with Toxoplasma). Polymerase chain reaction (PCR) was used to detect of B1(399pb) gene in 26 goat's blood samples and 7 samples from pregnant women. Results: A quick-test anti-cassette gondii results showed 26 positive samples of goats in a percentage of 34,666 percent, while a higher percentage of anti-T prevalence of 7 positive samples in women was 9,333 percent in age groups. T gondii antibodies in sera of goats were 56% in group 2-3 years in sera of goats, while in groups (20-25) years in women were 16%. Also, the higher prevalence of antibodies in goats and pregnant women was also 50% and 57.14% of IgG respectively. PCR results showed that B1gene (399 bp) was detected in 33 blood samples (26 samples of goats and 7 samples from pregnant women). The present of B1 gene in 26 goat's blood samples was 38.46% and 57.14% of the 7 pregnant women's blood samples. Conclusion: In total, 150 milk samples from the same group of goats and pregnant women have been obtained and analysed to investigate T gondii DNA. The amplified B1 gene was detected in 6 milk samples of 75 Goat samples (8%), whereas the findings showed that 75 milk samples of pregnant women did not contain the B1gene.
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreBackground: Staphylococcus spp. are widely distributed in nature and can cause nosocomial, skin infections, and foodborne illness, and it may lead to severe financial losses in birds by causing systemic infection in numerous organs. Aim: This study was conducted to determine the prevalence of Staphylococcus spp. in humans and birds in Baghdad city. Methods: Seventy-six oral cavity swabs were collected, including 41 from birds and 35 from breeders. All samples were examined by bacteriological methods and identified by using the VITEK technique, the samples were then further studied to test the ability of biofilm formation, and MDR factors and MAR index were tested with the use of seven antibiotics. Results: Among the 76 oral swa
... Show MoreCuO nanoparticles were synthesized in two different ways, firstly by precipitation method using copper acetate monohydrate Cu(CO2CH13)2·H2O, glacial acetic acid (CH3COOH) and sodium hydroxide(NaOH), and secondly by sol-gel method using copper chloride(CuCl2), sodium hydroxide (NaOH) and ethanol (C2H6O). Results of scanning electron microscopy (SEM) showed that different CuO nanostructures (spherical and Reef) can be formed using precipitation and sol- gel process, respectively, at which the particle size was found to be less than 2 µm. X-ray diffraction (XRD)manifested that the pure synthesized powder has no inclusions that may exist during preparations. XRD result
... Show MoreThis study aims at identifying how Baghdad Municipality employs public relations in law enforcement operations and the role played by the Municipality in communication and communicating with the public, raising their awareness and educating them to not abuse public property. As for the research tools, the researcher used the questionnaire as a data collection tool in addition to an analytical description of the means and methods of communication for public relations on Baghdad Municipality Facebook page.
The research comes out with a set of result; the most important of which are:
The means through which citizens learned about the existence of campaigns to impose the law an eliminate violati
t
The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in
... Show MoreIn the Name of God, the Most Gracious, the Most Merciful
Praise be to God, who has revealed the book, in which there are clear verses, insight and remembrance for the first people, and he promised those who learned it and did it with great rewards, and prayers and peace be upon those who pronounced the right and separated the speech, and on his family and companions the best of family and companions, and who followed them and guided them to the day of Moab .... ..
And yet: If we ponder a brief period and look at our course at a glance, we will find that those who lead us are the prophets, and those who guide us are the guardians, and those who protect us are the martyrs, an
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreBackground: Orofacial cleft is the most common craniofacial birth defect and the fourth most common congenital malformation in humans that have an effect on oral health in addition to nutrient intake affected in those children. This research aims to investigate gingival condition, dental caries experience and nutritional status among children with orofacial cleft and compare them with normal children. Materials and methods: The study group included 36 children with an age ranged (4-9) years of orofacial cleft. The control group included 37 children matched the control group in age and gender. Gingival condition measured by Gingival Index (Löe and Silness, 1963), while dental caries status was measured by (D1-4MFs/d1-4mfs) index according
... Show More