The expanding of the medically important diseases created by multidrug-resistant Acinetobacter baumannii warrants the evolve a new methodology for prevention includes vaccination and treatment. Totally of forty-five clinical isolates identified as A.baumannii were obtained from hospitalized patients from three hospital in Baghdad City during the period from February 2016 to August 2016. Followed by diagnosing using different methods. Every strain was tested for susceptibility testing also some important virulence factorswere detected. Two isolates were chosen for the immunization and vaccine model, the first one remittent for most antibiotics except one are too virulence (strong) and the second is less virulent and resistance (weak).Enzyme-linked immunosorbent assaywas used for assessments of Toll like receptor 4,and Toll like receptor 2 concentrations in mouse serum at 14, 21 and 28 days of immunization. Results proved that the strong isolate showed resistance to all antibiotics except one and positive to all virulence factors except one, while the weak isolate resistance to Ceftriaxone, Cefotaxime, positive to tow virulence factors. Mice were intramuscular inoculated with strong and weak isolate. There are high significant differences when using strong A.baumannii strong in the level of TLR4 and there was not an important variation among the use of strong and weak isolation in the level of TLR2.Finaly,the yield refers to the TLR4 plays a key role in innate sensing with multidrug resistance isolate immunization, whereas TLR 2 shows it gives the same level of stimulation during immunization with both strains but lesser concentration than TLR4, so the inactivated with MDR isolate has a potential for development as a candidate vaccine for strong protection against MDR isolate infections.
Purpose: To assess the antioxidant and antineoplastic effects of Hibiscus sabdariffa Linn. on oral squamous cell carcinoma cells. Materials and Methods: Human squamous cell carcinoma HSCC cells were tested for cytotoxicity by a methanol extract of Hibiscus sabdariffa (MEHSP). After 24, 48, and 72 ...
Moringa oleifera L. and red pomegranate extracts have been reported to inhibit gram-positive facultative anaerobe growth and inhibit the formation of biofilm on tooth surfaces. The current study aimed to assess the antibacterial effect of M. oleifera L. and red pomegranate extracts and their combinations against Porphyromonas gingivalis. The antimicrobial sensitivity, minimum inhibition concentrations (MIC), and minimum bactericidal concentrations after treatment with the aqueous extracts of M. oleifera L. and red pomegranate as well as their combination against clinically isolated P. gingivalis were determined using agar well diffusion and two-fold serial dilution. The anti-biofilm activity of the extracts and their combination was evaluat
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreThe bank deposits is fuel banking activity and raw material products for the commercial bank and the basis of its activity and its lifetime So the bank, which seeks to continue the successful development of the volume of cash deposits has translated the work of the bank to meet the needs of different sectors by providing the necessary funding, and from this point of view was the research problem a lack of interest departments of banking services to commercial banks as a means for the development of electronic cash deposits have, and which represents the basis for the supplier commercial bank fund.
Uropathogenic Escherichia coli is the main cause of urinary tract infections, the ability of this bacteria to cause urinary tract infections is related to a variety of virulence factors that enhance colonization and evade the immune response, one of these virulence factors is cytotoxic necrotizing factor 1 toxin which converts the glutamine residue to glutamic acid to activated GTPase Rho family. The study was meant to find out the prevalence rate of the cnf1 gene in Uropathogenic Escherichia coli isolated from Iraqi patients. Conventional laboratory methods were used for primary bacterial identification and molecular methods were used to confirm bacterial identity and gene detection. Escherichia coli was identified in 89/165 (53.93%) of th
... Show MoreRepresenting banking supervision An important function performed by the Iraqi Central Bank, in order to achieve stability in the financial and banking system, and safeguard the rights of depositors, investors and other targets, and to realize the Iraqi Central Bank banking supervision actors on banks, there must be an awareness of regulatory bank's existing control and subject them, as well as the role of banking oversight interested in spreading this awareness.
So sought search to find out the role played by the Iraqi Central Bank in raising awareness of the regulatory banking between the parties to the regulatory process, through the presentation and analysis of the legal framework for banking supervision and awareness supervisory
The second half of the last century witnessed a great scientific revolution that was able to bring about wide changes in various fields, including the field of physical education, which plays a fundamental role in the process of change for the better, and which knocked all the doors of modern science in various aspects and from this perspective we see that students have different capabilities And interests and motives, which require providing a differentiated education, and this depends on the necessity of knowing each student and on the school’s ability to know appropriate strategies for teaching each student so there is no single way to teach so the research problem comes in experimenting with an educational method that works on
... Show More