Cutaneous Leishmaniasis (CL) is an endemic disease and one of the major health problems in Iraq. Leishmania tropica is known as the causative agent of Cutaneous Leishmaniasis in Baghdad.The classical serological methods of diagnosing leishmaniasis is a poor sensitivity especially for the sub genus and time consuming Here we have investigated two primer pairs, one specific for Leishmania as genus and the primer specific for the species of L. tropica to be detected by polymerase chain reaction (PCR).Samples were collected from (AL-karama Teaching Hospital) and whole genomic DNA was extracted from axenic promastigotes.The extracted DNA was amplified by PCRwith two KDNA primer pairs, for genus specific (13A/13B) and (Lmj4/Uni21) to identify the specific species of cutaneous leishmaniasis. Amplified PCR products then run on gel electrophoresis and two visible bands of the two primers were seen, 120 and 800 bp, respectively. Our results indicate that the PCR technique is sensitive and specific for the detection and differentiation of cutaneous leishmaniasis agents and can be recommended to applied in hospitals and research centers.
In this paper the elevation angle of Jupiter at Baghdad location according to its coordinate for the period (2005-2020) has been studied. The Radio Jove pro. Edition program is used to achieve the Jupiter elevation angle at this time period. In 2007, 2008 the path of Jupiter is appeared near the horizon when the monitor trying to observe it. While in 2013, 2014 it's reached its maximum value then its return to reached its minimum value at 2019, 2020 according to the position of Jupiter in Baghdad for this period.
NEACADEMY's JOURNALS
Aim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (A
... Show MoreAbstract
Antibiotic treatment of S.typhi is difficult as compared to treatment of acute infection. Antibiotic resistance carried against S.typhi by using 6 kinds of antibiotics from different classes, their results showed that all isolates were high resistance to Ampicillin (99%), Gentamicin (98%), Amikacin (79%) and less resistances Trimethoprim (55%) , Imipenem (60%) and Ceftriaxone(66%) .
The present study focused on the molecular detection of Wzx flippase, Wzy polymerase genes in some Salmonella typhi isolates, Samples were collected from typhoid patients by classical lab work. Antibiotics susceptibilit
... Show MoreIn order to scrutinize the impact of the decoration of Sc upon the sensing performance of an XN nanotube (X = Al or Ga, and XNNT) in detecting sarin (SN), the density functionals M06-2X, τ-HCTHhyb, and B3LYP were utilized. The interaction of the pristine XNNT with SN was a physical adsorption with the sensing response (SR) of approximately 5.4. Decoration of the Sc metal into the surface of the AlN and GaN led to an increase in the adsorption energy of SN from −3.4 to −18.9, and −3.8 to −20.1 kcal/mol, respectively. Also, there was a significant increase in the corresponding SR to 38.0 and 100.5, the sensitivity of metal decorated XNNT (metal@XNNT) is increased. So, we found that Sc-decorating more increases the sensitivity of GaNN
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreReduce the required time for measuring the permeability of clayey soils by using new manufactured cell
In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the
... Show MoreIn this paper we used Hosoya polynomial ofgroupgraphs Z1,...,Z26 after representing each group as graph and using Dihedral group to"encrypt the plain texts with the immersion property which provided Hosoya polynomial to immerse the cipher text in another"cipher text to become very"difficult to solve.