ackground: Escherichia coli is one of the most
important bacterial pathogen that can cause several
disease to human being . In our study we try to
investigate the sensitivity resistance pattern of
Escherichia coli against three antibiotics ( Amikacin,
Nalidixic acid and Cephalexin).
Methods: For this purpose we collected 51 clinical
isolates of Escherichia coli from stool and urine of
outpatient and inpatient patients from different wards
of AL-SADER Teaching Hospital in AL-NAJAF
AL-ASHRAf, IRAQ, and tested by culture and
sensitivity test .
Results: The results appeared that Amikacin show
the highest percentage of sensitivity ( 66.66 % ) ,
while Cephalexin show the lowest percentage of
sensitivity ( 6.34 % ) .
Conclusions: we conclude that Amikacin is the most
sensitive antibacterial drug for Escherichia Coli as
compared with Nalidixic acid and Cephalexin, while
Cephalexin is the most resistant antibacterial drug
for Escherichia Coli as compared with Amikacin and
Nalidixic acid.
The importance of websites appears as a modern tool that helps people connect with each other and exchange information rapidly. An increase number of new websites have been created in public or private spheres, which benefit individuals and society as a whole. This research aims to design a website specialized in marketing sustainable fashion that meets the needs of the Saudi market. It followed a descriptive and analytical approach. A survey has been conducted on a random sample of e-marketing users. The sample number is 101 users. The study resulted in: Determining the effectiveness of e-marketing, studying consumer purchasing tendencies, and designing a website for sustainable fashion based on the survey’s results. The study recomme
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res
... Show MoreIn this paper, we propose new types of non-convex functions called strongly --vex functions and semi strongly --vex functions. We study some properties of these proposed functions. As an application of these functions in optimization problems, we discuss some optimality properties of the generalized nonlinear optimization problem for which we use, as an objective function, strongly --vex function and semi strongly --vex function.
Green nanotechnology is a thrilling and rising place of technology and generation that braces
the ideas of inexperienced chemistry with ability advantages for sustainability, protection, and
the general protection from the race human. The inexperienced chemistry method introduces a
proper technique for the production, processing, and alertness of much less dangerous chemical
substances to lessen threats to human fitness and the environment. The technique calls for inintensity expertise of the uncooked materials, particularly in phrases in their creation into
nanomaterials and the resultant bioactivities that pose very few dangerous outcomes for people
and the environment. In the twenty-first century, nanotec
Green nanotechnology is a thrilling and rising place of technology and generation that braces the ideas of inexperienced chemistry with ability advantages for sustainability, protection, and the general protection from the race human. The inexperienced chemistry method introduces a proper technique for the production, processing, and alertness of much less dangerous chemical substances to lessen threats to human fitness and the environment. The technique calls for in- intensity expertise of the uncooked materials, particularly in phrases in their creation into nanomaterials and the resultant bioactivities that pose very few dangerous outcomes for people and the environment. In the twenty-first century, nanotechnology has become a systematic
... Show MoreBeta-lactamase was purified from local isolate Klebsiella pneumonia by several steps included precipitation with ammonium sulphate at 20-40% saturation, DEAE- ion exchange chromatography and gel filtration on Sephacryl S-200 column. The obtained purification fold and recovery were 32.66; 47.04% respectively. The characterization of the purified beta-lactamase showed that the molecular weight was about 4000 daltons as determined by gel filtration.Purified enzyme had an optimal pH of 7 for activity and an optimal stability between pH 6.5-7.5, results shows that the optimal temperature appear to be 35 ? C .During storage the enzyme retained 72% at -20 ? C and retained 25% of the activity at the same period at 4 ? C.
This work involves preparation of new metal complexes via reaction of two anthraquinone ligands with Mn(II), Co(II), Ni(II), Cu(II), Zn(II) and Cd(II) metal ions . The ligands are prepared by treatment of 1- and 2-anthraquinone with acetic anhydride.
The complexes are characterized by different physicochemical methods; microelemental analysis, molar conductivity, FT-IR, UV-Vis spectra and magnetic measurements. The discussion of the outcome data of the prepared complexes indicates that all complexes are octahedral.
The biological activity properties of the ligands and most of their complexes are studied using gram-positive and gram-negative bacteria, which indicate that only two of th
... Show MoreThis paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show More