One hundred isolates of Pseudomonas aeruginosa were obtained from patients admitted to Baghdad hospitals, Iraq during the period between May 2018 until July 2018. These isolates were distributed as 15 isolates from blood, 25 isolates from urinary tract infections, 10 isolates from sputum, 12 isolates from wounds, 15 isolates from ear infections, 15 isolates from bronchial wash of patients suffering from respiratory tract infections in addition to 8 isolates from cystic fibrosis patients. The isolates were initially identified by culturing on MacConkey agar, blood agar and P. aeruginosa agar then diagnosed by performing some morphological and biochemical tests. The second diagnosis was done by API 20E system followed by Vitek 2 compact system. Antibiotic sensitivity test was carried out towards 15 antibiotics using disc diffusion method (Kirby–Bauer method). The results of sensitivity test showed that P. aeruginosa isolates possessed high resistance towards most antibiotics under study, the most antibiotic resistance was towards Gentamicin 87 (87%), whereas the lowest resistance was towards Imipenem 10 (10%). In this study, two types of methods were used in the detection of biofilm formation: the first one was Congo red agar method and the second one was microtiter plate method. In the first method, results showed that biofilm formed by 57/100 (57%) according to black color production on media, whereas in the second method was 69/100 (69%) produce strong adherence according to OD in ELISA reader. Genotypic detection of many virulence factors related to P. aeruginosa was performed using conventional PCR. These included: gene coded for exoenzyme S (exoS), exoenzyme U (exoU), exotoxin A (toxA), two phospholipases C encoded by (plcH) and (plcN), alginate (algD), (lasB), rpsl, proteaseIV, and Neuraminidase (nan1). The results revealed that the most frequent gene was exoS as it was detected in 87/100 (87%) isolates, whereas the least frequent gene was nan1 as it was detected in only 9/100 (9%). The frequency of detection of other genes were as follows: toxAi in 55/100 (55%); plcH in 45/100 (45%); exoU in 42/100 (42%); plcN in 33/100 (33%); proteaseIV in 31/100 (31%), algD in 29/100 (29%); lasB in 28/100 (28%), and rpsl in 25/100 (25%). Phylogenetic analysis by Enterobacterial Repetitive Intergenic Consensus (ERIC-PCR), ERIC-DNA Fingerprinting revealed the diversity of all isolates in Baghdad by using Dice coefficient and the unweighted pair group method with arthmetic average (group method) of phylogenetic analysis. The percentage level of similarity clearly showed that the isolates examined by species were divided into two distinct cluster numbers, in addition to three single isolates (clone), that clustered at a similarity level of (93%). According to the statistical analysis, it was found that the correlation coefficient of ERIC genotyping method with virulence genes in this study and antibiotics sensitivity test was significant at P < 0.05 (two-tailed), whereas correlation with biofilm was not significant
Spices are natural substances taken from special plants and have a different taste when added to food and some of them have great benefits for health and body. These plants vary from country to country depending on the type of soil and how they are grown and this affects their quality. In this study, the specific activity of 40K, 238U and 232Th series and 137Cs in some selected natural food spices commonly used in Iraq kitchen were determined using gamma spectrometry and the ingested doses via food consumption were also assessed. The average specific activity of 40K, 238<
The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreIn the present study, an attempt has been made to study the change in water quality of the river in terms of turbidity during lockdown associated with COVID-19. Iraq announced the longest-ever lockdown on 25 March 2020 due to COVID-19 pandemic.
In the absence of ground observations, remote sensing data was adopted, especially during this period. The change in the visible region's spectral reflectance of water in part of the river has been analyzed using the Landsat 8 OLI multispectral remote sensing data at Tigris River, Salah al-Din province (Bayji / near the refinery), Iraq. It was found that the green and red bands are most sensitive and can be used to estimate turbidity. Furthermore, the temporal variation in turbidity was a
... Show MoreThe identification and sequencing of Amyloid Precursor Protien (APP) and presenilin (PS) opened the door for the engineering of transgenic mouse models to study pathogenic mechanisms of Alzheimer Disease (AD). The first successful mouse models over-expressed human APP with an Familiar AD (FAD) linked mutation in the brain. These mice exhibit Aß plaques, neuron loss, dystrophic neurites, inflammatory responses, learning impairments and deficits in synaptic transmission and/or long-term potentiation. The genotypes of all offspring of APP/PS1 mutant mice are analysed by Polymerise Chain Reactions. Generally there are two possibilities to analyse the DNA. The First, primers for APP or PS1 was used separately assuming that both genes are int
... Show MoreThe current research addresses the psychological disobedience in general and disobedience in post-modernism arts in specific. The research problem is summarized by the following question: does disobedience have representations in the graffiti art? The research objective is to identify disobedience and its representations in the graffiti. The research limits are set and the terms used are identified. As for the theoretical framework, it consists of three sections: the first: the psychological disobedience, whereas the second: disobedience in post-modernism arts. The third section addresses graffiti art. Then come the research procedures followed by the results, conclusions, recommendations, and suggestions. The two researchers arrived at
... Show More