Leishmaniasis is endemic ofIraq in both cutaneous and visceral form. The available tools for diagnosis and detection of Leishmaniaare nonspecific and may interfere with other species. In this study, Polymerase Chain Reaction (PCR) has been used to identify Iraqi isolate of visceral leishmaniasis (MHOM/ IQ/2005/MRU15) which a previously diagnosed by classical serological tests. PCR amplificationwas carried out using species-specific primers of Leishmania donovani. Four primer pairs of mini-circle DNA and ITS-1 were used.13A/13B, which is used to identify Leishmaniaas a genus, NM12, LITSR/L5.8S and BHUL18S, were used to detect the sub species of L. donovani.The result ofPCR amplification of 13A/13BkDNA revealed that a band of ~ 120 bp. NM12, LITSR/L5.8Sand BHUL18S primer pairs demonstrated bands of 204 bp, 320 bpand 311 bp, respectively. Theresultsof this study arerecommended to be used foridentification ofvisceral leishmaniasis identification instead of time consuming and non-specific classical methods.
Abstract
The aim of this research is to concentrate on the of knowledge management activities, initial activities: (Acquisition, Selection, Generation, Assimilation, Emission) knowledge, and support activities: (Measurement, Control, Coordination, Leadership) that is manipulate and controlling in achieving knowledge management cases in organization, that’s is leads to knowledge chain model, then determining the level of membership for these activities to knowledge chain model in a sample of Iraqi organization pushed by knowledge (Universities). The research depends on check list for gaining the data required, theses check list designed by apparently in diagnosing research dimensions and measurem
... Show MoreAlteration of repeat tract length within the SSR of phase variable genes may enhance the persistence of isolates within their host for a long time (a period of months) (Alamro et al.,2014). Alamro et al. (2014) showed there was trend towards selection for OFF state or low expression for five phase variable genes (opc, hmbr, nadA, nalP, hpuAB) in three carriers (V54, V124 and V64) within strains belonging into CC174 and CC167 in first, second and third time points. He concluded that the selection for low or OFF state helped N. meningitidis to persist for a long time (Alamro et al., 2014). The current study aimed to detect the alteration in the repeat tracts of the same five variable genes within the previous three carriers (V54, V124, and V6
... Show MoreThe isolates of Staphylococcus aureus were isolated from patients with various infections in hospitals, the isolates were identified and accurately diagnosed by phenotypic examination and biochemical tests, as well Vitek-2, and then genetic detection and diagnosis of many of the pathogenic factors associated with Staphylococcus aureus using conventional polymerase chain reaction (PCR) and testing for association by antibiotic resistance and production of some toxins by Staphylococcus aureus. After performing analysis of statistical, it was set up that the correlation coefficient of the PCR technique using virulence genes, sensitivity test to antibiotics and other virulence factors were significant at p < 0.05, but was insignificant with the
... Show MoreThis article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the a
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreAn immunological technique was investigated for the detection of human semen in forensic analysis.This technique included a preparation of anti-human seminal plasma antibodies, by immunizing rabbits with treated human semen. The human semen was treated with an acid to prevent cross reactivity with other human body fluids. The antibody produced was tested against different animal,s seminal fluid samples (dog, goat ,sheep, cow) and human body fluids( saliva, blood , vaginal fluid, ear wax and human semen). It was found that using this developed technique was only selectively responsed with human semen . The prepered kit was evaluated and tested in Forensic laboratory- Ministry of Health. Finally, results were obtained in a c
... Show MoreThis study investigates consecutive reaction assisted by pervaporation for the first time. It studies the saponification of diethyladipate DA with sodium hydroxide NaOH solution synchronous with separating ethanol from the reaction mixture through an aqueous – organic membrane. The effect of time on some variables such as: permeated ethanol concentration EtOH wt%, separation factor (α), concentration of NaOH solution CB in the reaction medium and the conversion of DA to monoethyladipate (the intermediate product) was studied. It was shown that EtOH wt% and the conversion increased with increasing time unlike CB but (α) showed the existence of maximum value during the time of experiment. The process of reaction assisted by pervaporation
... Show MoreAlPO4 solid acid catalyst was prepared in order to use it in transesterification reaction of edible oil after supporting it with tungsten oxide. The maximum conversion of edible oil was obtained 78.78% at catalyst concentration (5gm.), temperature 70°Ϲ, 30/1 methanol/edible oil molar ratio, and time 5hr. The study of kinetics of the transesterification reaction of edible oil indicates that the reaction has an order of 3/2, while the value of activation energy for transesterification reaction is 51.367 kJ/mole and frequency factor equal 26219.13(L/ mol.minute).