Alternation of bacterial antioxidant defense pathways might affect susceptibility to antibiotics in dual ways. Using a relatively simple model based on wild-type and oxyR Escherichia coli mature biofilms, their counterpart planktonic cultures and exponentially growing planktonic cultures, we explored the role of OxyR-mediated metabolism alternations in modulation of susceptibility to antibiotics ciprofloxacin and cefotaxime. All three types of cultures were placed in fresh medium,1 h after antibiotics were added and incubation continued further for 2 h. Killing rates of antibiotics were determined, biofilm eradication using crystal violet assay was estimated, expression of rpoS, katG, sulA genes as well as HPI and HPII catalase activity were measured. Biofilms of both strains were more recalcitrant to ciprofloxacin and cefotaxime at all tested concentrations compared to exponentially growing planktonic cultures. In oxyR biofilms killing rate of ciprofloxacin was lower, and killing rate of cefotaxime was higher compared to the parental strain. Compared to biofilms, wild-type biofilm counterpart planktonic cultures showed higher tolerance to low doses of ciprofloxacin, while oxyR plankton demonstrated higher tolerance to cefotaxime. Higher recalcitrance of oxyR biofilms to ciprofloxacin may be caused by an increase in persister cells under conditions of enhanced oxidative stress and activated SOS response.
Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.
According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability
p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive
preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the
average durations of the preventive and corrective maintenance actions a
... Show MoreBurdock ( Arctium lappa), is among the most popular plants in traditional medicine and it is associated with several biological effects. Literature survey revealed the presence of phenylpropanoid compounds .The most widespread are hydroxycinnamic acids ( mainly caffeic acid and chlorogenic acid) and lignans (mainly arctiin and arctigenin). This work will confirm the presence of these compounds in Arctium lappa, cultivated in Iraq, in both root and leaf samples. The dried plant samples were extracted by soxhlet with 80% methanol then separated the main constituents by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Identification of the isolated compounds wa
... Show MoreIdentifying phenolic compounds in some genera belonging in the Amaranthaceae family by HPLC technique
The current research is concerned with studying the variables in the promotion process which influence the advertisement design structure, as the accomplished design and construction process is subject to many variables, whether they were intellectual or technological, internal or external variables. These variables may overlap in order to get a comprehensive system for the artistic configuration, that any design in its content reaches the highest levels of perfection is connected to the extent of its compliance with and approximation to these variables, that is why we find their reflections deeply rooted in the individual's mind, especially the designer artist who is influenced by everything surrounding him forming knowledge systems res
... Show MoreTV drama has gone through many developmental stages until it reached and settled in the form of TV series of thirty episodes. Alongside the development of the TV technologies and the widespread of satellite channels, the form of the TV drama has changed and the series has consisted of two parts and then parts multiplied until they amounted to ten parts and more. This form of TV drama has become an artistic phenomenon, that once the series is displayed on one of the channels and achieves a noticeable success, its producers work to produce a second part of that series and so on. This form of TV drama has remained away from being researched.
This has urged the researcher to accomplish this study entitled (TV series of multiple parts fro
Abstract
Theoretically, the aim of the paper is identify linguistic expressions, such as proverbs, wise sayings, and popular sayings, used by the playwright A. N. Ostrovsky , along with their translations into Arabic by the Iraqi translator Abdullah Habbah and the Syrian translator HashimHumadi. And practically, there were found about fifty sayings, made of proverbs, wise sayings and popular sayings, which were identified and taken into analysis in respect to their Arabic translation , with the specification of the best rendition of the original text.
Critics and professionals em
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show More