Mutans streptococci (MS) are a group of oral bacteria considered as the main cariogenic organisms. MS consists of several species of genus Streptococcus which are sharing similar phenotypes and genotypes. The aim of this study is to determine the genetic diversity of the core species of clinical strains of Streptococcus mutans, Streptococcus sobrinus and Streptococcus downei by using repitative extragenic palindromic (REP) primer. The DNA of the clinical strains of S. mutans (n=10), S. sobrinus (n=05) and S. downei (n=04) have been employed in the present study, which have been previously isolated from caries active subjects. The DNA of the clinical and reference strains was subjected to PCR amplification using REP primer. The phylogenetic dendrogram is constructed from the REP PCR banding profile by neighbour-joining method using PyElph 1.4 software. The size of the DNA amplicons generated by using REP primer were S. mutans (1500 bp to 250 bp), S. sobrinus (6000 bp to 250 bp) and S. downei (5000 bp to 400 bp). The results present common band at 480 bp in all the clinical strains of S. sobrinus. The current study is the first to demonstrate the genetic variety of S. sobrinus and S. downei by using REP primer. REP-PCR have been found to be a powerful method to study the molecular diversity of S. mutans, S. sobrinus and S. downei. Additionally, further studies are suggested to analyze the species specific bands and also to find the possibility to produce a new specific primer for S. sobrinus.
Terrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro
... Show MoreThis paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
In this research paper, two techniques were used to treat the drill cuttings resulting from the oil-based drilling fluid. The drill cuttings were taken from the southern Rumaila fields which prepared for testing and fixed with 100 gm per sample and contaminated with two types of crude oil, one from Rumaila oilfields with Sp.gr of 0.882 and the other from the eastern Baghdad oilfield with Sp.gr of 0.924 besides contamination levels of 10% and 15% w/w in mass. Samples were treated first with microwave with a power applied of 540 & 180 watts as well as a time of 50 minutes. It was found that the results reached below 1% w/w in mass, except for two samples they reached below 1.5% w/w in mass. Then, the sample of 1.41% w/w in mass,
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreThe health care provided by health institutions and all kinds suffers from many problems, and since the health services provided are related to human life, it is necessary to shed light on this activity and identify the causes of these problems. This research aims to Definition of health institutions (hospitals) Performance audit of these institutions according to the latest indicators, which are the standards of health accreditation for hospitals, specifically the basic standards issued by the Health Care Accreditation Council (HCAC) to reach the level of performance and Knowledge of Constraints that lead to in an acceptable manner consistent with the approved standards. In theoretical and practical study, a number of conclusions were r
... Show MoreGod Almighty set out to build mosques, and he commanded to seek their architecture, and the competition for them, and allocate them with types of worship that are not valid in others, and to preserve their sanctity and not to be degraded and taken for mundane purposes and special benefits, because they are considered one of the most prominent features of Islam and the rituals of Islamic society, so this research came to show the rule Sharia in various and contemporary issues that are needed by the imams of the mosques, their rulers, and those responsible for them. Among the issues in which they have examined comparative juristic research and reached the most correct opinion are:
Building mosques over or under buildings and factories i
Objective: Synthesis, Characterization of formazan derivatives and studies the antioxidant activity of prepared compounds and molecular docking. Methods: In this study, formazan compounds (III–XIV) were produced by combining Schiff base compounds (I), (II) with diazonium salts resulting from reactions of different aromatic amines with sodium nitrate in the presence of Con.HCl at 0–5°C. When isonicotinic acid hydrazide reacts with (N,N-dimethylbenzaldehyde, 4-hydroxy-3-methoxybenzaldehyde) in the presence glacial acetic acid as a solvent Schiff base compounds are created. Results: The prepared compounds were identified by FT-IR, 1H NMR, 13C NMR, then the antioxidant activity of the derivatives and molecular docking were studied. D
... Show MoreTwo specie's of terrnitls are described as new to science from Iraq Amitermes corpnlentus sp. n. and Anacanthotermes savvensis sp. n., with two figures.