One hundred isolates of Pseudomonas aeruginosa were obtained from patients admitted to Baghdad hospitals, Iraq during the period between May 2018 until July 2018. These isolates were distributed as 15 isolates from blood, 25 isolates from urinary tract infections, 10 isolates from sputum, 12 isolates from wounds, 15 isolates from ear infections, 15 isolates from bronchial wash of patients suffering from respiratory tract infections in addition to 8 isolates from cystic fibrosis patients. The isolates were initially identified by culturing on MacConkey agar, blood agar and P. aeruginosa agar then diagnosed by performing some morphological and biochemical tests. The second diagnosis was done by API 20E system followed by Vitek 2 compact system. Antibiotic sensitivity test was carried out towards 15 antibiotics using disc diffusion method (Kirby–Bauer method). The results of sensitivity test showed that P. aeruginosa isolates possessed high resistance towards most antibiotics under study, the most antibiotic resistance was towards Gentamicin 87 (87%), whereas the lowest resistance was towards Imipenem 10 (10%). In this study, two types of methods were used in the detection of biofilm formation: the first one was Congo red agar method and the second one was microtiter plate method. In the first method, results showed that biofilm formed by 57/100 (57%) according to black color production on media, whereas in the second method was 69/100 (69%) produce strong adherence according to OD in ELISA reader. Genotypic detection of many virulence factors related to P. aeruginosa was performed using conventional PCR. These included: gene coded for exoenzyme S (exoS), exoenzyme U (exoU), exotoxin A (toxA), two phospholipases C encoded by (plcH) and (plcN), alginate (algD), (lasB), rpsl, proteaseIV, and Neuraminidase (nan1). The results revealed that the most frequent gene was exoS as it was detected in 87/100 (87%) isolates, whereas the least frequent gene was nan1 as it was detected in only 9/100 (9%). The frequency of detection of other genes were as follows: toxAi in 55/100 (55%); plcH in 45/100 (45%); exoU in 42/100 (42%); plcN in 33/100 (33%); proteaseIV in 31/100 (31%), algD in 29/100 (29%); lasB in 28/100 (28%), and rpsl in 25/100 (25%). Phylogenetic analysis by Enterobacterial Repetitive Intergenic Consensus (ERIC-PCR), ERIC-DNA Fingerprinting revealed the diversity of all isolates in Baghdad by using Dice coefficient and the unweighted pair group method with arthmetic average (group method) of phylogenetic analysis. The percentage level of similarity clearly showed that the isolates examined by species were divided into two distinct cluster numbers, in addition to three single isolates (clone), that clustered at a similarity level of (93%). According to the statistical analysis, it was found that the correlation coefficient of ERIC genotyping method with virulence genes in this study and antibiotics sensitivity test was significant at P < 0.05 (two-tailed), whereas correlation with biofilm was not significant
Abstract: Persian literature, after the spread of Islam in Pars, received a lot of influence from the subtle and rhetorical details of the Holy Quran. This effect is more in poetry than in prose because the weights of Persian poetry are closer to the melody of the Qur'an and its weights.The effectiveness of most of the prose works is only in the Quranic themes and words. Persian poetry that has benefited from various sciences of rhetoric, including semantics, eloquence and rhetoric. The degree and manner of influence of each of the didactic, lyrical, epic and travelogue literary types is different from the rhetorical points of the Quran. The instructions under educational literature have benefited the least from Quranic rhetoric. The max
... Show MoreAd hoc networks are characterized by ease of setup, low costs, and frequent use in the corporate world. They ensure safety to the user and maintain the confidentiality of the information circulated. They also allow the user to address the cases of communication failure in areas subject to destruction of communication infrastructure. The proposed protocols in the ad hoc networks often build only one path to achieve communication between the nodes, due to the restrictions of battery run out and the movement of the nodes. This connection is often subject to a failure within a certain range. Thus, multiple alternate paths in ad hoc networks use a solution to failing node communications. In addition, when looking at the situation where interf
... Show MoreIn the present time, radioactive contamination is considered one of the most dangerous types of environmental pollution. It usually takes place because of a leakage of radioactive materials to one of the environment natural components, such as, water, air, and soil. Iraq is considered one of the most contaminated environments in the world; this is closely associated with the wars Iraq had suffered from; especially, in 1991 and 2003. Considering the importance of the radioactive contamination and its different health impacts on the population, the current paper is interested in studying this type of environmental contamination and its impact on the birth defects depending on the data available in the annual reports issued by the Iraqi min
... Show MoreCuring of concrete is the maintenance of a satisfactory moisture content and temperature for a
period of time immediately following placing so the desired properties are developed. Accelerated
curing is advantages where early strength gain in concrete is important. The expose of concrete
specimens to the accelerated curing conditions which permit the specimens to develop a significant
portion of their ultimate strength within a period of time (1-2 days), depends on the method of the
curing cycle.Three accelerated curing test methods are adopted in this study. These are warm water,
autogenous and proposed test methods. The results of this study has shown good correlation
between the accelerated strength especially for
The construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show More