This study was designed to investigate the capability of gram-negative bacteria that isolated form wound and burn infection to production of Biofilm which included (32) isolates, which have multi – drug resistant to antibiotics. The isolates included (10) Pseudomonas aeruginosa, (9) Klebsiella pneumoniae, (6) Escherichia coli, (5) Proteus mirabilis and (2) Enterobacter cloacae. The method used method links the crystal violet with biofilm and reading by ELISA which was adopted on the values of optical density of violets that linked to the mass of biofilm at the wavelength of (620) nm, the test results showed variation of biofilm composition for all bacterial species depending on the optical density value while the most production of biofilm was product form bacterial isolated from diabetes patients wound. Agarose gal electrophoreses results show that all isolate have a different plasmid profile according to the (size and position), it was also that temperature used as a curing factor causes a high frequency loss the plasmid from all isolates and according to this reason the yield was different after the curing that maybe refers to the role of both plasmid and chromosome in regulating this phenomena.
Abstract:
The achievement of economic and social welfare for individual is the main target to all policies that adopted by all countries worldwide either were economic, social, political or others. The obtaining of education by individuals and especially the higher education is one of the most important determinates in achieving the wellbeing and lasted economic development. This is because via the higher education new fields can be opened in front of individuals in order to get adequate jobs associated with their scientific specialization. This is allowing educated individuals gain higher income that can reduce the gap of income inequality.
Thus, this paper aims to analysis the n
... Show MoreThis study showed that liver of Passer domesticus bilobed the right lobe is cardiac shape while the left is elliptical and the liver colour is brown. It is occupying most of anterior and middle parts of abdominal cavity. The liver is surrounded by Glison capsule which is represented by a thin layer of connective tissue with septum extend peripherally in liver tissue. The liver tissue is formed from polyhedral hepatocyte arrange as irregular hepatic cord surrounded the central vein. Each cell contains one or two nucleus with one or more nucleolus. The blood sinusoid appeared between the liver cells .The hepatic cord arranged radially around the central vein. The portal area is clear and surrounded by connective tissue. Gallbladder is almost
... Show Moreبعد ثورة تموز عام 1958في العراق, لم يكن يسمح للقطاع الخاص بأن تكون له استثمارات كبيرة في القطاعات الاقتصادية. وذلك بسبب الإيديولوجيات التي كانت تؤطر الفكر السياسي. حيث كان النهج الاشتراكي هو الغالب في إدارة الأنشطة الاقتصادية. إذ قامت الدولة بتأميم معظم الاستثمارات الخاصة الكبيرة ،لاس
... Show MoreBackground: The insertion torque (IT) values and implant stability quotient (ISQ) values are the measurements most used to assess primary implant stability. This study aimed to assess the relationship between ISQ values and IT. Materials and methods: This study included 24 patients with a mean (SD) age of 47.9 (13.64) years (range 25-75 years). The patients received 42 dental implants (DI), 33 in the mandible and 9 in the maxilla. The DI were installed using the motorized method with 35 Ncm torque, When DI could not be inserted to the requisite depth by the motorized method, a hand ratchet was used and the IT was recorded as ˃ 35 Ncm. Implant stability was measured utilizing Osstell® ISQ. The secondary stability was measured after 16
... Show MoreThe Shiranish Formation is cropped out in several areas in northern Iraq. A stratigraphic and facies study was conducted within the Duhok region to determine the sedimentary environment. Three microfacies, reflecting the various subenvironments within different shelf parts of the deep sea, have been identified within the Shiranish Formation. Four depositional environments are identified: slope, the toe of slope, deep shelf, and deep-sea or cratonic deep basin. The Shiranish Formation in the Duhok region, Northern Iraq, was deposited in an open shelf carbonate platform. The Shiranish Formation sequence is divided into six third-order cycles in the study area. These asymmetrical cycles reflect an imbalance between the relative level of the
... Show MoreBackground: Periodontal diseases are one of the major dental pathologies that affect human populations worldwide at high prevalence rates The term periodontal disease usually refers only to plaque related inflammatory disease of the dental supporting tissues. Mouth rinses which act as an anti-plaque agents mostly used as adjuncts to oral hygiene. Aims of the study: To Estimate and compare the effects of Aloe vera relative to chlorhexidine on the clinical periodontal parameters (plaque index, gingival index, bleeding on probing). Material and method: A total of 44 subjects with plaque-induced gingivitis, baseline of data were collected for (PLI, GI, and BOP) and underwent oral hygiene instruction, scaling and polishing, then divided into:
... Show MoreBackground: Chronic Tonsillitis outcomes from frequent attacks of acute Tonsillitis usually for six attacks or more per year for two successive years. Poor dental hygiene had been associated with oro- pharyngeal problems and causes both dental caries and Tonsillitis alike.
Objective: To evaluate the relation between chronic Tonsillitis and severity of dental caries among 4-5 years old children.
Patients and Methods: Random sample of children was selected in Hospital of Baghdad medical city Otolaryngologic department city. Fifty-four children aged 4- 5 years old were participated in this study divided into two group: 29 children with Chronic Tonsillitis (study group) and 25 children with intact tonsils (control group). The determina
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreGymnastics play from sports games that need to use appropriate methods and strategies that address mental abilities and that let the learner create and think about better performance with the supervision and guidance of the teacher. The researcher has chosen meditative thinking, which is a kind of thinking that needs to be taken care of. It is thinking about the situation in front of the individual, analysing it to his elements and drawing up plans that need to be understood with a view to reaching the results required by the situation and evaluating the results in the light of the plans. The analysis of the situation looks to different elements and look for internal relationships between these elements in this case. The problem is that fem
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More