The increasing use of antiseptic compounds creates selective pressure cause emergence of antiseptic resistance among Staphylococcus aureus .Resistance mechanism of antiseptic is driven mainly by multi drug resistant (MDR) efflux protein.Sixty five isolates of S.aureuswere collected from different clinical sources and subjected to 11 antibiotics most of them are recognized by efflux systems as extruded substrates. Range of efflux activity was estimated using cartwheel method. Simultaneous discrimination of antiseptic coding genes (qacA/B, smr and norA)as well as nuc and mecA genes among multidrug resistantS.aureus(MRSA) isolates was preformed using multiplex PCR assay , 61 isolatesamong 65 were positive tonucand mecA genes, 58 of them were positive to norA, 14 of them were positive to qacA/B and only two were positive to smr. All isolates detected with qacA/B characterized by fluoroquinolones resistant and most of them show strong efflux activity at cartwheel assay, all of the 14 isolates positive qacA/B were sequenced to differentiate between variants depending on position 323 (aspartic in QacA, alanine in QacB), 3 of them harbored asparagines amino acid at position 323 and considered to be a new variants that reported for the first time.
In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the ban
... Show MoreObjective(s): To assess the eating habits of adolescent females with iron deficient anemia.
Methodology: This study employed a quantitative research, descriptive evaluation design.The study was carried out on adolescent girls attending Kirkuk secondary school, period from 11 April to 27 December 2022. A non- probability (Purposive) sample has been applied to obtain the study goals. The study sample was (62) student who participate in the study.
Results: Pre-test results from the study revealed that 54.8% of students had moderate IDA. While the students' iron levels returned to normal in the posttest (53.2%). The majority of students (59.7%) had poor eatin
... Show MoreFolic acid and multivitamin tablets containing Aspergillus flavus Penicillia spp. and Cladosporia spores were prepared at a compression pressure of 148 MN/m2 and stored at 35°C under different relative humidifies (75,85, and 95)% within air tight containers, to study the effect of storage condition on them, as well as ,the estimation of the microbial level of the raw materials intended to be used in the two kinds of tablets . Result showed that some raw materials derived from natural origin were heavily contaminated with microorganism compared to that of synthetic origin ,the results also indicated the effect of relative humidity , types of fungal spore , and the hygroscopic nature of exicpient upon survival. Multivit
... Show MoreChronic inflammation can induce proliferative events and posttranslational DNA modifications in prostate tissue through oxidative stress. The present study was designed to evaluate the changes in serum levels of TNF-α, malomdialdehyde (MDA) and total antioxidant status (TAS) patients with different stages of malignant prostatic cancer (PCa) and benign prostatic hyperplasia (BPH). One hundred males (age range of 58-72 years) with different stages of malignant PCa were recruited from the Radiotherapy and Nuclear Medicine Teaching Hospital in Baghdad during the period from September 2010 to April 2011. The patients were categorized according to the 4 disease stages (I, II, III, and IV); 25 patients with benign prostatic hyperplasia (BPH)
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More