Mycobacterium tuberculosis resistance to rifampicin is mainly mediated through mutations in the rpoB gene. The effects of rpoB mutations are relieved by secondary mutations in rpoA or rpoC genes. This study aims to identify mutations in rpoB, rpoA, and rpoC genes of Mycobacterium tuberculosis isolates and clarify their contribution to rifampicin resistance. Seventy isolates were identified by acid-fast bacilli smear, Genexpert assay, and growth on Lowenstein Jensen medium. Drug susceptibility, testing was performed by the proportional method. DNA extraction, PCR, and sequencing were accomplished for the entire rpoA, rpoB, and rpoC genes. Twenty-three isolates (32.85%) showed resistance to rifampicin by either proportion method or Genexpert assay. Sequence analysis of the rpoB gene revealed fourteen different mutation patterns. Inside the rifampicin resistance determining region (RRDR), codons: S531L, D516V were highly mutated with frequencies of (21.73%, 17.39%) respectively. Outside the RRDR, there were nine different types of mutations, and M479L was the most prevalent one. Out of 23 RIF resistant isolates, seven isolates (30.43%) carried mutations in the rpoA gene, and twelve isolates (52.17%) harbored a mutation in rpoC. Most of the mutations were identified for the first time in this study. The current study demonstrated that mutations in rpoB, rpoA, and rpoC contributed to RIF resistance in Mycobacterium tuberculosis and this new finding may be relevant to realize how compensatory mutations in the rpoA and rpoC genes restore the fitness cost caused by rifampin resistance-conferring mutations in rpoB.
The research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability
... Show MorePVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThis paper tackles with principal component analysis method (PCA ) to dimensionality reduction in the case of linear combinations to digital image processing and analysis. The PCA is statistical technique that shrinkages a multivariate data set consisting of inter-correlated variables into a data set consisting of variables that are uncorrelated linear combination, while ensuring the least possible loss of useful information. This method was applied to a group of satellite images of a certain area in the province of Basra, which represents the mouth of the Tigris and Euphrates rivers in the Shatt al-Arab in the province of Basra.
... Show MoreIn this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show More