The current study aimed to detect the effect of gentamicin stress on the expression of hla (encodes hemolysin) and nuc (encodes nuclease) genes of Staphylococcus aureus. Fifty-eight isolates identified as S. aureus were isolated locally from different clinical specimens. Disk diffusion method was used to detect the resistance to S. aureus. The minimum inhibitory concentration (MIC) of gentamicin was estimated by broth microdilution method. hla and nuc genes were determined by polymerase chain reaction technique. The biofilm was evaluated using the microtiter plate method in the presence and absence of gentamicin at sub-MIC. The results showed that 18 (31%) and 40 (69%) S. aureus isolates were sensitive and resistant to gentamicin, respectively. All S. aureus isolates succeeded in forming biofilm. However, eight (13.79%), 28 (48.28%) and 22 (37.93%) isolates produced weak, moderate and strong biofilms respectively. In most isolates, gentamicin at sub-MIC decreased biofilm intensity. Due to gentamicin stress, the hla and nuc genes were upregulated in S. aureus biofilm.
Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show MoreChronic renal failure (CRF) is progressive irreversible destruction of kidney tissue by disease which, if not treated by dialysis or transplant, will result in patient's death. This study was carried out on 30 patients (17 male and 13 female) with chronic renal failure. The aim of this research was studied the changes in the level of total protein ,albumin, calcium ,ionized calcium, phosphorous , iron ,ALP, LDH ,CK and FFA in patients with CRF before and after hemodialysis .The obtained results have been compared with 30 healthy subjects as control group (18male and 12 female). The results showed that there was significant increase in the level of calcium ,ionized calcium, phosphorous ,iron ,ALP,LDH,CK and FFA ,while there was a signifi
... Show MoreBased on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation. Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.
It is known that language learners face multiple difficulties in writing and creating an inte
... Show MoreThis paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreThe study was carried out to detection of H. pylori in (218) patients who attended two teaching hospitals in Baghdad. The diagnosis was done by Immunochromatography methods. Stools and blood samples were taken from each patient as well as other (30) healthy control matching in age. The study included measurement the Levels of Interleukin-32, Interleukin-33, and Acid phosphatase in sera of patients and control .The result indicated presence of H pylori antigen in 115 cases 59 cases of males and 51 of females , Also, the result indicated increasing levels of IL-32 and IL-33 and Acid phosphatase in patients sera in comparison with healthy control.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More