Preferred Language
Articles
/
bBYFvogBVTCNdQwCa4EW
DNA Sequences of qacE∆1 gene in Pseudomonas aeruginosa isolated from wounds and burns infections.
...Show More Authors

Publication Date
Thu Feb 29 2024
Journal Name
Iraqi Journal Of Science
Tigecycline is the Most Effective against Multi-Drug Resistant Klebsiella pneumoniae Recovered from Burn Wound Infections in Two Hospitals in Al-Kut City, Iraq
...Show More Authors

     Klebsiella pneumoniae is among the most frequent microorganisms isolated from infections of burn wounds. This cross-sectional study aimed to investigate the distribution of multi-drug resistant (MDR) K. pneumoniae in two burn hospitals and the antibiotic resistance profile in different burn regions of the same patient. It was performed in two hospitals (Al-Zahraa and Al-Karama) in Al-Kut, Iraq, between January and May 2022. Totally, 100 burn swabs were collected from 40 patients of both genders suffering from burn wound infections, with ages ranging between 3 and 50 years. Klebsiella pneumoniae were isolated and identified using conventional methods followed by VITEK®2 system and confirmed via polymerase chain reaction targeting t

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Bacterial Infections Associated with Cutaneous Leishmaniasis
...Show More Authors

Background:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparison between HSV-1 Ag detection techniques by ELISA and real-time PCR in breast cancer patients suffering from periodontitis
...Show More Authors

Background: Periodontitis is a long-standing infection that destroys the gums, periodontal ligaments, and the alveolar bone that supports the teeth. Inflammation of the gums and chronic periodontitis are both caused by the bacteria in the dental plaque and the herpes viruses, especially types 1 and 2 of the herpes simplex virus.

Objectives: To compare the ELISA and real-time PCR as ways to detect the herpes simplex virus in breast cancer pat

J Fac Med Baghdad

2023; Vol.65, No. 3

Received:March., 2023

Accepted: June. 2023

Published: Oct. 2023

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 31 2015
Journal Name
International Journal Of Advanced Research
BK polyomavirus and Cytomegalovirus Co-infections in renal transplant recipients: a single center study
...Show More Authors

Background: Opportunistic viral infections make an important threat to renal transplantation recipients (RTRs), and with the use of more intense newly-developed immunosuppressive drugs; the risk of renal allograft loss due to reactivation of these viruses has increased considerably. At the top priority of these viruses lie BK polyomavirus (BKV) and human cytomegalovirus (CMV). Reactivation of these viruses in these chronically immunosuppressed RTRs can lead to renal impairment and subsequently allograft loss, unless early detected and properly treated. Objectives: The study aimed to detect and quantify plasma viral load of BKV and CMV in RTRs using quantitative real time PCR (qRT-PCR), in order to study the prevalence of these two viruses i

... Show More
View Publication
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Population Therapeutics And Clinical Pharmacology
Detection the Phylogenetic groups of E. coli that isolated from diarrheal in children under five years and study their relationship of common serotypes in Baghdad hospitals.
...Show More Authors

Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Complex of Characteristic Zero in the Skew-Shape (8, 6, 3) / (u,1) where u = 1 and 2
...Show More Authors

In this work, we find the terms of the complex of characteristic zero in the case of the skew-shape (8,6, 3)/(u,1), where u = 1 and 2. We also study this complex as a diagram by using the mapping Cone and other concepts.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Composition operator induced by ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1
...Show More Authors

We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Gentamicin Upregulates the Gene Expression of hla and nuc in Staphylococcus aureus
...Show More Authors

The current study aimed to detect the effect of gentamicin stress on the expression of hla (encodes hemolysin) and nuc (encodes nuclease) genes of Staphylococcus aureus. Fifty-eight isolates identified as S. aureus were isolated locally from different clinical specimens. Disk diffusion method was used to detect the resistance to S. aureus. The minimum inhibitory concentration (MIC) of gentamicin was estimated by broth microdilution method. hla and nuc genes were determined by polymerase chain reaction technique. The biofilm was evaluated using the microtiter plate method in the presence and absence of gentamicin at sub-MIC. The results showed that 18 (31%) and 40 (69%) S. aureus isolates were sensitive and resistant to gentamicin, respectiv

... Show More