This study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnetii IQ-No.6; and then recorded in the National Center for Biotechnology Information (NCBI) under an accession numbers of MN473204.1 and MN473205.1. Comparative identity of the local strains with NCBI-BLAST strains/isolates revealed 97% similarity and 0.1-0.6% of total genetic mutations/changes. NCBI-BLAST Homology Sequence reported high significant identity (P<0.05) between the local, C. burnetii IQ-No.5 and C. burnetii IQ-No.6; strains and C. burnetii 3345937 (CP014354.1) Netherlands isolate at 99.10% and 99.06%, respectively. The current study concluded that the percentage of infected cows with coxiellosis is relatively high, and Coxiella should be listed as abortive pathogen. Therefore, additional studies should be performed including different animals, samples, and regions.
The issue of the Circular Economy is not a new issue to several countries, especially the developed ones. Here in Iraq it is considered newly introduced, despite the few attempts to establish projects that concern recycling most of them were doomed to fail, due to two main reasons: the first one is the financial and administrative corruption widespread in all departments of the country, the second one is the priorities of public spending. It is well known that Iraq was subjected to two major attacks, the ISIS entry attack in 2014 to Iraq. ISIS occupied about a third of Iraqi lands which resulted in a collapse in oil prices, as Iraq depends almost entirely on oil revenues in its budget which is the second attack. This made the Iraqi governme
... Show MorePseudomonas aeruginosa is an opportunistic pathogen responsible for serious infections. At least three different exopolysaccharides, alginate, polysaccharide synthesis locus (Psl), and pellicle exopolysaccharide (Pel) make up the biofilm matrix in P. aeruginosa . The effect of temperature on the biofilm formation and gene expression was examined by microtiter plate and real-time quantitative polymerase chain reaction (qRT-PCR). To be able to determine the effect of temperature on biofilm formation and gene expression of P. aeruginosa, 303 clinical and environmental samples were collected. Pseudomonas aeruginosa was isolated from 61 (20.1%) and 48 (15.8%) of the clinical and e
... Show MoreIn the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show MoreA strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreChange detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac
The research aims to identify the importance of using analytical procedures in the detection of creative accounting practices. To achieve this goal, (100) questionnaires were prepared and distributed to the auditors in the Federal Financial Supervision Bureau and the authorized auditors' offices and practitioners of the auditing profession in Iraq. For the purpose of testing the research hypothesis and analyzing data, some appropriate statistical methods have been used and the use of the statistical program (SPSS) to analyze the data. The results of the research showed that the analytical procedures and tests applied by the auditor have a role in revealing and limiting creative accounting practices and methods and that auditors u
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More