Foodborne diseases are a major risk for human health. Millions of people become sick as a result of eating contaminated food with microorganisms that cause diseases. S. aureus is considered as one of the most important pathogenic bacteria, having the ability to activate certain genes that encode for heat stable enterotoxins and cause Staphylococcal food poisoning. Thus, this study aimed to determine the prevalence of multi resistant Staphylococcus aureus that produce enterotoxins in different sources of food . Forty nine isolates were identified as S.aureus, according to morphological and biochemical tests. They were isolated from 387 different food samples from several randomly covered restaurants and supermarkets in different regions of Baghdad. Molecular diagnosis of S. aureus using specific primers for the 16S rRNA gene was carried out by Polymerase Chain Reaction (PCR ) technique . Susceptibility of 43 isolates of S.aureus was tested against 15 antimicrobial agents. The results revealed that all the isolates were resistant (100%) to mecillinam, highly resistant to vancomycine and meropenemin (74.4 %) and moderately resistant to Oxacillin, Erythromycin Cefotaxime, and Cefiximein (67.4, 60.4, 62.8, , 60.5 %, respectively), while they showed low resistance to Gentamicin (34.8%). In addition, all of these isolates were susceptible to Tigecycline and Amoxicillin/ clavulanic acid and Cefoxitin-Cloxacilin. High percentages of oxicillin resistant S. aureus were isolated from cooked food samples, followed by meat products, and with less percentage from pastry products. Molecular detection of enterotoxins A and B of Staphylococcus aureus isolates was performed using specific primers based on PCR. The results revealed that S. aureus isolated from cooked food had the highest percentage of the isolates producing the enterotoxins A and B. Type A enterotoxin gene showed a higher prevalence than type B gene among cooked food , dairy products and pastry. In conclusion, the results revealed a high prevalence of some classical enterotoxin genes in multi-drug resistant S.aureus isolated from different sources of food, which can cause food-poisoning and, consequently, a potential serious problem for public health.
The synthesis of [1,2-diaminoethane-N,N'-bis(2-butylidine-3- onedioxime)] [II2L] and its cobalt(II), nickel(II), copper(II), palladium(II), platinum(II, IV), zinc(II), cadmium(II) and mercury(II) complexes is reported. The compounds were characterised by elemental analyses, spectroscopic methods [I.R, UV-Vis, ('H NMR. and EI mass for H2L)], molar conductivities, magnetic moments. I.R. spectra show that (H2L) behaves as a neutral or mononegative ligand depending on the nature of the metal ions. The molar conductance of the complexes in (DMSO) is commensurate with their ionic character. On the basis of the above measurements, a square planar geometry is proposed for NOD, Pd(II), and Pt(II) complexes, and an octahedr-al structure with trans
... Show Moreالمستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة
This model is an extension to H.M.M.S and related developments models of a single product. These models will be converted to deal with Multiproduct for productive company. This model executed by computer programming technique to maximize profits
This paper is attempt to study the nonlinear second order delay multi-value problems. We want to say that the properties of such kind of problems are the same as the properties of those with out delay just more technically involved. Our results discuss several known properties, introduce some notations and definitions. We also give an approximate solution to the coined problems using the Galerkin's method.
Playfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using key matrix and the second stratum is a transposi
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreThe traditional shortest path problem is mainly concerned with identifying the associated paths in the transportation network that represent the shortest distance between the source and the destination in the transportation network by finding either cost or distance. As for the problem of research under study it is to find the shortest optimal path of multi-objective (cost, distance and time) at the same time has been clarified through the application of a proposed practical model of the problem of multi-objective shortest path to solve the problem of the most important 25 commercial US cities by travel in the car or plane. The proposed model was also solved using the lexicographic method through package program Win-QSB 2.0 for operation
... Show MoreA multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreWithin this research, The problem of scheduling jobs on a single machine is the subject of study to minimize the multi-criteria and multi-objective functions. The first problem, minimizing the multi-criteria, which include Total Completion Time, Total Late Work, and Maximum Earliness Time (∑𝐶𝑗, ∑𝑉𝑗, 𝐸𝑚𝑎𝑥), and the second problem, minimizing the multi-objective functions ∑𝐶𝑗 + ∑𝑉𝑗 +𝐸𝑚𝑎𝑥 are the problems at hand in this paper. In this study, a mathematical model is created to address the research problems, and some rules provide efficient (optimal) solutions to these problems. It has also been proven that each optimal solution for ∑𝐶𝑗 + ∑𝑉𝑗 + 𝐸𝑚𝑎𝑥 is an effic
... Show More