Background: A Catheter-associated with candidiasis infection is the most common nosocomial infection and the objective of this work is to isolate and identify Candida species from catheterized patients by ordinary culture and PCR.Objective:To study the isolation and identification of Candida species from catheterized patients by culture media and polymerase chain reaction(PCR).Methods: One hundred and thirty five Candida species isolates were obtained from urine culture of catheterized specimens from male and female patients , During the period between October 2011 to April 2012 , attending AL-Ramadi general teaching Hospital. A quantitative urine culture for isolation and identification of Candida species was. The isolation of Candida species was done out on selective media with antibiotics is Sabouraud Dextrose Agar. The identification of Candida species was based upon a combination of morphological and biochemical criteria as germ tube test and API 20 candida. Molecular study of Candida species was done using polymerase chain reaction (PCR).Results: Out of the one hundred and thirty five catheterized urine examined .Candida spp. was isolated from in 92 samples. The isolated of Candida spp. were recorded 26(40.0%) C.albicans among female patients and 20(36.4 %) among male patients .positive candidiasis was detected among diabetic patients (28.6%) from female and (20.0%) from male .Also the candidiasis was detected among patients under antibiotic treatment was (20.3%) from female patients and (32.1%) from male patients.Polymerase chain reaction ( PCR) results showed that out of 27cultured specimens , (18) were positive for C. albicans (66.7%) , and out of 9 specimens ,(7) were positive for C.glabrata (77.8%) while out of 4specimens ,(2) were positive for C.parapsilosis (50.0%) .Statistical analysis using chi – square test was applied in this work.Conclusion: The three species of Candida. albicans , Candida .glabrata .& Candida .parapsilosis are important causes of UTI in patients under catheterization in Ramadi teaching hospital and they could be one of causes nosocomial infection .
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise closure topological spaces, fibrewise wake topological spaces, fibrewise strong topological spaces over B. Also, we introduce the concepts of fibrewise w-closed (resp., w-coclosed, w-biclosed) and w-open (resp., w-coopen, w-biopen) topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
A space X is named a πp – normal if for each closed set F and each π – closed set F’ in X with F ∩ F’ = ∅, there are p – open sets U and V of X with U ∩ V = ∅ whereas F ⊆ U and F’ ⊆ V. Our work studies and discusses a new kind of normality in generalized topological spaces. We define ϑπp – normal, ϑ–mildly normal, & ϑ–almost normal, ϑp– normal, & ϑ–mildly p–normal, & ϑ–almost p-normal and ϑπ-normal space, and we discuss some of their properties.
Systems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different
... Show MoreIn this paper, we introduce the concept of almost Quasi-Frobcnius fuzzy ring as a " " of Quasi-Frobenius ring. We give some properties about this concept with qoutient fuzzy ring. Also, we study the fuzzy external direct sum of fuzzy rings.
The main object of this paper is to study the representations of monomial groups and characters technique for representations of monomial groups. We refer to monomial groups by M-groups. Moreover we investigate the relation of monomial groups and solvable groups. Many applications have been given the symbol G e.g. group of order 297 is an M-group and solvable. For any group G, the factor group G/G? (G? is the derived subgroup of G) is an M-group in particular if G = Sn, SL(4,R).
It is believed that culture plays an important role in the ELF classroom activities (Al- Mutawa, & Kilani, 1989:87). It is important for the teacher to recognize potential negative (culturally based) perceptions of their learners. In Iraq, for instance, it is not. Uncommon to meet silent expressionless students that arc supposedly English language learners. It is possible for the beginner to interpret this negatively as a lack of interest in the study of English. This interpretation may play a harmful role in the classroom methodology. An instructor has to be intercultural competent to be an effective teacher. It will be more effective if the instructor adopts a consistent style of instruction to allow learners to adapt within the bounds of
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More