Background: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as Klebsiella pneumoniae . All isolates, under study, developed high resistance toward Cefitrixon, Ampicillin, Amoxicillin, Ticarcillin, Ticarcillin+Clavulanic acid, and Ceftazidim estimated by disc diffusion method. All isolates characterized by harboring the highest resistant in a percentage reached 100% against antibiotics, under study. This study determined the Minimal Inhibitory Concentration were detected by eight E-test strips for isolates. As well as the isolates were strong biofilm production for three isolates, while three were moderate of biofilm formation and other isolates were weak former; at the value of (P≤0.05) was considered as a significant. Genotype detection of Metalo-beta lactamase (IMP-1) by PCR technique in Klebsiella pneumoniae . Upon using PCR technique exposed only three isolates;30% of isolates (two from urine, one from blood) samples harbored IMP-1 gene. The study was also found relationship between IMP-1 and biofilm formation in isolates which were harboring these genes, when (P ≤ 0.05). Conclusions: K. pneumoniae were isolated from different sources. All isolates were resistant to most antibiotics used in this study. The isolates have Metallo-beta lactamse. PCR was showed K. pneumoniae have IMP-1 gene,.This study also found there was relationship between biofilm formation and IMP-1 gene in K. pneumoniae (P≤0.05).
In this paper, we present a study of examples of writings that are known in the science of Semitic research compared to the texts (Jewish-Arab, Samaritan-Arabic) written in Hebrew script and texts from the Bible. We try to explain the role of these literary works in Islamic history and civilization, as one of the most important documents are the writings (Gniza), which contributed to provide a full presentation on life in the Islamic community in all aspects of life, especially religious activity and showed the sincere relationship in dealing with the other under tolerance The University of Cambridge has prepared Islamic documents and kept them in separate boxes and presented them to researchers to convey the Islamic heritage written by
... Show MoreAim and Objectives: The objective of this study was to illustrate the link between periodontitis (PO) and endothelial dysfunction in hypertensive patients. Materials and Methods: This cross‑sectional study involved 53 hypertensive patients with or without PO compared with 28 healthy controls. On the basis of the study protocol, the participants were divided into three groups: Group (1): 24 patients with hypertension only, Group (2): 29 patients with hypertension and PO, and Group (3): 28 healthy controls. Lipid profile, endothelin‑1 (ET‑1), and high‑sensitivity C‑reactive protein (hs‑CRP) were measured. Blood pressure and body mass index (BMI) were evaluated. Diagnostic criteria of severe PO periodontal indices including plaque
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis research aims to study and analyze the reality of monetary policy and financial sustainability in Iraq through either a descriptive or analytical approach by trying to link and coordinate between monetary policy and fiscal policy to enhance economic sustainability. The research is based on the hypothesis that the monetary policy of Iraq contributes to achieving financial stability, which improves economic sustainability by providing aid and assistance to the state to reduce the budget deficit and exacerbate indebtedness. The author used the monetary policy indicators, the re-deduction of Treasury transfers by the central bank and the money supply, and financial sustainability indicators, including the public debt indicators and the
... Show MoreThe research deals with the relationship between supplier evaluation (single variable) and family brand strategy (single variable) a case study in the battery factory\Al-Waziriya, and the fact that the industrial sector represents a cornerstone for building the country’s economy of and their development. The research has been selected on this basis. The problem stems from the lack of business understanding of the real role played by the assessment of the suppliers' and its strong impact on its reputation and position in the market. The research gains its importance by moving away from traditional marketing style in terms of characteristics related to the resource itself, and the service provided by the factory to c
... Show MoreThe concept of privatization is built on the basis of the transfer of assets and services of the public sector to the private sector this concept has appeared in the eighties of the last century whene the high oil prices took place and recession solution swept the world Which called for the freedom of the market and left the room for the private sector to take the initiatine in economic activity. Both the IMF have adopted this thesis in their programs of the structural adjustment in light of external and internal factors helped to Create the conditions to accept thesis that under the pretext of achieving a number of economic goals.
In Iraq in spite of
... Show MoreThe current research aims to know the method and strategy of rainstorming for students to open the door towards innovation and creativity in the field of teaching the subject of geography and the importance of brainstorming method and the studies that touched on it. The study also dealt with the steps of teaching the method of brainstorming and the most important (traditional and modern), and the difficulties of using the method of brainstorming in the teaching process, as well as explained the guidance to improve teaching using the method of brainstorming in the teaching p
... Show MoreThe problem of the research came through the following question (what is the effectiveness of active design in contemporary industrial products), and it emphasized the importance of research to make society with its members in a positive state of activity, and what can help the industrial product design to achieve this, but the goal of the study is (determining the characteristics and principles of design Active and its effectiveness in the industrial product), and the study was determined by industrial products related to daily, recreational and sports activity, The researcher relied on a form to determine the axes of analysis for the sample models, in order to reach the results of the research, the most important of which are: Realiz
... Show MoreThe Colour is one of important aspect of human activity, especially in General arts and press, and also is one of the essential elements to achieve and build the idea of design technology in the appropriate places, according to the space of designs work.
In a view of the colour and its relationship with the Semiotics, we can find that the objectives goals at the point of visual formats that’s «oral or written”. In last years, the intellectual concerns of Semiotics through eye contact methods, that’s meaning contact methods for get messages of sense of sight.
The semiotics term Can be defined into: (the sequential feature or network system has relations according agreed language rules, in a particular environment, also is a g