Bacteria form complex and highly elaborate surface adherent communities known as biofilms.Biofilm have been shown to be associated with several human diseases ,and to colonize a wide variety of medical devices . The current study focuses on contribution of extracted genomic DNA in biofilm formation by P. aeruginosa and K. pneumoniae isolates .The percentages of Pseudomonas aeruginosa recovery from drinking water in this study were 10%(20 positive P. aeruginosa samples ) and K. pneumonia., 7%(14 positive K. pneumonia samples).The results showed that all P.aeruginosa and K. pneumoniae isolates (100%) were slime producer but in different degrees by forming of black colonies on congored agar: very black colonies , black colonies and red colonies .Results indicated that addition of extracted genomic DNA to microtitre-plate cultures stimulate biofilm formation(either endogenous or exogenous DNA).
Lipopolysaccharide (LPS) of Campylobacter coli was extracted by using
digestive enzyme and hot phenol method. The effect of LPS on lymphocyte
transform was studies by lymphocyte transformation index for twenty blood samples
were collected from apparently healthy control.
The results were showed significant differences (P< 0.05) between samples which
treatrd with phytohemagglutnin PHA (66.1 ± 0.6) and the samples which treated
with LPS of C. coli (74.2 ± 0.8) when compared with control, this lead to suggest
that the LPS extracted from C. coli may play a role as a mitogen to transformed
lymphocytes.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreAs the diversity and characteristics of Trichoderma species are difficult to determine using morphological methods, henceforth molecular tools are crucial. This study utilized random amplified polymorphic DNA (RAPD) technique to investigate the genetic diversity of Trichoderma with sexual phase Hypocrea and to identify similarities and differences in the phylogenetic tree. Nine Iraqi Trichoderma strains (four strains of T. atroviride, one strain of Hypocrea lixii, two strains of T. gamsii and two strains of T. longibriantium) were examined in this research. The genomic DNA of each species was extracted and amplified with each of the fiv
... Show MoreFour alkaloids compounds were extracted from the fruits and leaves, of plant known locally as (Anab AI-Thebe Solanum nigram), by various solvents systems, from an earlier study by the researcher. DNA tested its effect in plasmid PBR322 deportation method using Gel Electrophoresis. Results showed that two of those extract for full effectiveness digestible pieces of RNA and DNA plasmid, and digestive partly of the other alternatives. That could prove results indicate that this type of alkaloids consist of biological effectiveness of anti-twnors, through
... Show MoreThe aim of this study was to evaluate in-vitro activity of Cefamandol and Ceftazidime, in combination with potassium clavulanate against 10 uropathogenic E.coli isolated from patients with chronic complicated urinary tract infections (UTIs), these isolates were identified by the Api identification systems.The antimicrobial susceptibility tests were determined by Kirby-Bauer method and the minimum inhibitory concentrations of Cefamandol and Ceftazidime, were determined, by tube method. These isolates were resistant to Ampicillin (Amp), Amoxicillin (Amo), Carbenicillin (Cb), Ticarcillin (Tic), Amoxicillin\ Potassium Clavulanate {Augmentin}, (Amo\CA), Ticarcillin\ Potassium Clavulanate {Timentin} (Tic\CA), Cefamandol (Cfm) and Ceftazidime (
... Show MoreIn this work we study the influence of the laser pulse energy and ablation time on the aluminum nanoparticles productivity during nanosecond laser ablation of bulk aluminum immersed in liquid.
Aluminum nanoparticles were synthesized by pulsed laser ablation of Al targets in ethanol for 3-8 minutes using the 1064 nm wavelength of a Nd:YAG laser with energies of 300-500 mJ per pulse.The laser energy was varied between 300 and 500 mJ/pulse, whereas the ablation time was set to 5 minutes. UV-Visible absorption spectra was used for the characterization and comparison of products.
Effects of Ozonated Water on Micro Leakage between Enamel and Fissure Sealants Prepared by Different Etching Technique (An in vitro Study), Baraa M Jabar*, Muna S Khalaf
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe current study aims to show the importance of plant products as mosquitocides against Culex quinquefasciatus. Castor oil Nanoemulsions were subedit in various ratios including castor oil, ethanol, tween 80, and deionized water by using ultrasonication. Thermodynamic, centrifugation, PH, assay which improved that the formula of 10 ml of castor oil, ethanol 5ml, tween 80 (14 ml) and deionized water 71ml was more stable than other formulas. The stable formula of castor oil nanoemulsion was characterized by transmission electron microscopy (TEM) and dynamic light scattering (DLS). Nanoemulsion droplets were spherical in shape and were found to have a Z-average diameter of 87.4nm. A concentration of ca
... Show More