Mycobacterium tuberculosis resistance to rifampicin is mainly mediated through mutations in the rpoB gene. The effects of rpoB mutations are relieved by secondary mutations in rpoA or rpoC genes. This study aims to identify mutations in rpoB, rpoA, and rpoC genes of Mycobacterium tuberculosis isolates and clarify their contribution to rifampicin resistance. Seventy isolates were identified by acid-fast bacilli smear, Genexpert assay, and growth on Lowenstein Jensen medium. Drug susceptibility, testing was performed by the proportional method. DNA extraction, PCR, and sequencing were accomplished for the entire rpoA, rpoB, and rpoC genes. Twenty-three isolates (32.85%) showed resistance to rifampicin by either proportion method or Genexpert assay. Sequence analysis of the rpoB gene revealed fourteen different mutation patterns. Inside the rifampicin resistance determining region (RRDR), codons: S531L, D516V were highly mutated with frequencies of (21.73%, 17.39%) respectively. Outside the RRDR, there were nine different types of mutations, and M479L was the most prevalent one. Out of 23 RIF resistant isolates, seven isolates (30.43%) carried mutations in the rpoA gene, and twelve isolates (52.17%) harbored a mutation in rpoC. Most of the mutations were identified for the first time in this study. The current study demonstrated that mutations in rpoB, rpoA, and rpoC contributed to RIF resistance in Mycobacterium tuberculosis and this new finding may be relevant to realize how compensatory mutations in the rpoA and rpoC genes restore the fitness cost caused by rifampin resistance-conferring mutations in rpoB.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.
The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin
... Show MoreMultiple drilling problems are being faced continuously while drilling wells in the southern Iraqi oil fields. Many of which are handled poorly and inefficiently which yields longer non-productive time due to the lack of knowledge about the source of these problems. This study aims to investigate the Basra oil fields formations from Faris to Mishrif, diagnose the potential problems, and present the optimum treatment for each problem.
Gathering of field data and previous studies on the subject, in addition to the field experience of drilling supervisors were all the information bases of this study. Southern Iraqi oil fields were studied and analyzed care
Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreDuring the educational practices in the Spanish department at the Faculty of Languages , University of Baghdad , we noticed that the personal pronouns in effect replaced by the direct and indirect characterized hardly be expressed , and the difficulty of her education.
Rationale: I chose this topic because the personal pronouns differ between the Spanish language and the Arabic language. We believe that this study may be useful not only for language teachers, but also for students, because it can contribute to a greater awareness of and correct weaknesses.
Objectives: To apply the model from which to address the problems in the use of personal pronouns Spanish , and the difference between effect of direct and indire
... Show MoreIranian stories have been one of the most important aspects of Iranian society's culture and have reflected us as a mirror of all its cultural, societal and political dimensions.Among the important elements of the story can be the creation of space and the movement and the creation of characters and conflict and content and the angle of vision and landscape, language and subject. Studying the elements of the story leads to more understanding and determining the strength and skill of the author by studying the elements of his story. The story of Rustom and Suhrab is also one of the many stories in which the elements of the story are often noticed and show the skill of the great professor Al-Fardousi to benefit from these eleme
... Show MoreWith the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored
... Show MoreThis research explores the intricate relationship between environmental sustainability and urban design in Al-Jumhuriya Neighborhood, Baghdad, reflecting urban development challenges and opportunities. It highlights the need to balance growth, functionality, and quality of life with environmental responsibility in urban areas worldwide. The research includes a literature review on environmental sustainability in urban design and the utilization of multifunctional land in contemporary cities. The research employs a mixed-methods approach, combining quantitative and qualitative data collection methods. Survey results show a diverse range of perspectives, indicating concerns about air quality and local regulations but also positive views on co
... Show More