ABSTRACT Possible interference of vamin nutritional solution with the activity of several B-lactam antibiotics against E.coli was evaluated in vitro.In Minimal basal salts-glucose medium rapid growth inhibition of sensitive E. coli was induced by 4 µg/ml of ampicillin / cloxaillin, 8 µg/ml of ampicillin, 6 µg/ml of carbencillin, hostacillin, and cephalotin, and by 32 µg/ml of penicillin G and cloxacillin. Significant inactivation of up to 32 µg/ml of carbencillin, cephalotin, penicillin G, and hostacillin was induced by addition of 1:20 v/v vamin. This inactivation was due to the presence of specific amino acids in the mixture. Deletions of amino acids revealed that valine, leucine, isoleucine, tyrosine, tryptophan, phenylalanine, cysteine, methionine, asparagine, or threonine were essential for such inactivation while the other ami no acids (alanine, glycine, aspartic acid, argenine, glutamine, glutamic acid, histidine, serine, proline, and lycine) were not Furthermore, the presence of the three branched chain amino acids ( Valine, leucine, and isoleucine ) was essential to inactivate cephalotin and carbencillin. While the aromatic amino acids ( Tryptophan, phenylalanine and tyrosine) were essential to However, cephalotin. inactivate cloxacillin, and ampicillin / cloxacillin inactivated by any amino acid treatment ampicillin, were not These results suggest that certain B-lactam antibiotics undergo significant decrease in activity when sensitive E. coli is treated with vamin and this effect is due to the presence of specific amino acid in the solution
This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show MoreEmail is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B
... Show MoreBackground: The autism spectrum disorder (ASD) describes a wide range of symptoms, including difficulty with social interaction and communication skills. Controversial thinking about oral health of children with ASD, in general may have a lower hygiene level than healthy individuals, low caries rate and high body weight in comparison to healthy children. This study was conducted to assess the oral health status in relation to nutritional status among institutionalized autistic children and adolescents. Materials and methods: From 12 institutes in Baghdad, the study group contained 364 child and adolescent with ASD (Male= 294, Female=70), while control group included 441 normal child and adolescent (Male=357, Female=84) from primary and seco
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreAfter the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking se
... Show MoreThe preparation of the title compound, C26H25N, was achieved by the condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 molar ratio. There are two crystallographically independent molecules in the asymmetric unit. The two cyclohexyl rings adopt an
Background: Malnutrition during human growth affects the size of the tissues at different stages of life, body proportions, body chemistry, as well as quality and texture of tissues. Teeth are particularly sensitive to malnutrition. Malnutrition may affect odontometric measurement involving tooth size dimensions. The aim of this study was to estimate the effect of nutrition on teeth size dimension measurements among students aged 15 years old. Materials and methods: This study was conducted among malnourished group in comparison to well-nourished group matching with age and gender. The present study included 167 students aged 15 years (83 malnourished and 84 well-nourished). The assessment of nutritional status was done by using body mass
... Show More