The expanding of the medically important diseases created by multidrug-resistant Acinetobacter baumannii warrants the evolve a new methodology for prevention includes vaccination and treatment. Totally of forty-five clinical isolates identified as A.baumannii were obtained from hospitalized patients from three hospital in Baghdad City during the period from February 2016 to August 2016. Followed by diagnosing using different methods. Every strain was tested for susceptibility testing also some important virulence factorswere detected. Two isolates were chosen for the immunization and vaccine model, the first one remittent for most antibiotics except one are too virulence (strong) and the second is less virulent and resistance (weak).Enzyme-linked immunosorbent assaywas used for assessments of Toll like receptor 4,and Toll like receptor 2 concentrations in mouse serum at 14, 21 and 28 days of immunization. Results proved that the strong isolate showed resistance to all antibiotics except one and positive to all virulence factors except one, while the weak isolate resistance to Ceftriaxone, Cefotaxime, positive to tow virulence factors. Mice were intramuscular inoculated with strong and weak isolate. There are high significant differences when using strong A.baumannii strong in the level of TLR4 and there was not an important variation among the use of strong and weak isolation in the level of TLR2.Finaly,the yield refers to the TLR4 plays a key role in innate sensing with multidrug resistance isolate immunization, whereas TLR 2 shows it gives the same level of stimulation during immunization with both strains but lesser concentration than TLR4, so the inactivated with MDR isolate has a potential for development as a candidate vaccine for strong protection against MDR isolate infections.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAn increasing trend to use probiotic and study their effects on the pathogens has been conductor where they are defined as live micro-organisms that give a health benefit to the host when ingested in sufficient quantities, including the yeast Saccharomyces boulardii In addition research show that a magnetic field (MF) has a biological effect. This study aims to investigate the effects of magnetic field on the inhibitory action of Saccharomyces boulardii against bacteria isolated from urinary tract infection, Study the sensitivity of bacterial isolates to antibiotics after diagnosis by microscopic, Cultural and biochemical examinations as well as Api20 E examinations were used gram negative bacteria , Most isolates were resistant to an
... Show MoreThe aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.
Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.
Based on this principle, a statistical questionnaire was designed to
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this research, we did this qualitative and quantitative study in order to improve the assay of aspirin colorimetrically using visible spectrophotometer. This method depends on aqueous hydrolysis of aspirin and then treating it with the ferric chloride acidic solution to give violet colored complex with salicylic acid, as a result of aspirin hydrolysis, which has a maximum absorption at 530nm. This procedure was applied to determine the purity of aspirin powder and tablet. The results were approximately comparative so that the linearity was observed in the high value of both correlation coefficient (R= 0.998) and Determination Coefficient or Linearity (R2= 0.996) while the molar absorpitivity was 1.3× 103 mole
Evaluation of the Antibacterial Efficacy of Electrolyzed Oxidizing Water as an Irrigant against Enterococcus faecalis (An In vitro Study), Noor A Khait*, Muna Saleem Kalaf
ATTAPULGITE clay was modified in this study by the graphene oxide sheets and the clay was diagnosed before and after modification using several techniques (Fourier-transform infrared spectroscopy FT-IR, X-ray powder diffraction XRD, Scanning electron microscope SEM , energy dispersive spectroscopy EDX ) ,The surface of the attapulgite clay (before (Ata) after modification by graphene oxide (Ata-GO) ) was applied to adsorption of the Alizarin dye from its water solutions through the application of several kinetic models (pseudo first-order model , pseudo second -order model , intraparticle diffusion model ),It was found that the practical results follow pseudo second -order model. The process of modification on the surface of the mud has imp
... Show More