Mycobacterium tuberculosis resistance to rifampicin is mainly mediated through mutations in the rpoB gene. The effects of rpoB mutations are relieved by secondary mutations in rpoA or rpoC genes. This study aims to identify mutations in rpoB, rpoA, and rpoC genes of Mycobacterium tuberculosis isolates and clarify their contribution to rifampicin resistance. Seventy isolates were identified by acid-fast bacilli smear, Genexpert assay, and growth on Lowenstein Jensen medium. Drug susceptibility, testing was performed by the proportional method. DNA extraction, PCR, and sequencing were accomplished for the entire rpoA, rpoB, and rpoC genes. Twenty-three isolates (32.85%) showed resistance to rifampicin by either proportion method or Genexpert assay. Sequence analysis of the rpoB gene revealed fourteen different mutation patterns. Inside the rifampicin resistance determining region (RRDR), codons: S531L, D516V were highly mutated with frequencies of (21.73%, 17.39%) respectively. Outside the RRDR, there were nine different types of mutations, and M479L was the most prevalent one. Out of 23 RIF resistant isolates, seven isolates (30.43%) carried mutations in the rpoA gene, and twelve isolates (52.17%) harbored a mutation in rpoC. Most of the mutations were identified for the first time in this study. The current study demonstrated that mutations in rpoB, rpoA, and rpoC contributed to RIF resistance in Mycobacterium tuberculosis and this new finding may be relevant to realize how compensatory mutations in the rpoA and rpoC genes restore the fitness cost caused by rifampin resistance-conferring mutations in rpoB.
The thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreThe study aims to analyze computer textbooks content for preparatory stage according to the logical thinking. The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea during the analysis process. One of the content analysis tools which was designed based on mental processes employed during logical thinking has utilized to figure out the study results. The findings revealed that logical thinking skills formed (52%) in fourth preparatory textbook and (47%) in fifth preparatory textbook.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreLower extremity exoskeletons can assist with performing particular functions such as gait assistance, and physical therapy support for subjects who have lost the ability to walk. This paper presents the analysis and evaluation of lightweight and adjustable two degrees of freedom, quasi-passive lower limb device to improve gait rehabilitation. The exoskeleton consists of a high torque DC motor mounted on a metal plate above the hip joint, and a link that transmits assistance torque from the motor to the thigh. The knee joint is passively actuated by spring installed parallel with the joint. The action of the passive component (spring) is combined with mechanical output of the motor to provide a good control on the designed exoskeleton whi
... Show MoreCarbonate matrix stimulation technology has progressed tremendously in the last decade through creative laboratory research and novel fluid advancements. Still, existing methods for optimizing the stimulation of wells in vast carbonate reservoirs are inadequate. Consequently, oil and gas wells are stimulated routinely to expand production and maximize recovery. Matrix acidizing is extensively used because of its low cost and ability to restore the original productivity of damaged wells and provide additional production capacity. The Ahdeb oil field lacks studies in matrix acidizing; therefore, this work provided new information on limestone acidizing in the Mishrif reservoir. Moreover, several reports have been issued on the difficulties en
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show More