The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. Invasive Fungal diseases are result in very high morbidity as well as up to 60% mortality for people with severely susceptible hosts. This review will illustrate briefly the virulence factors in Candida albicans.
We studied the relationship between DNA sequencing of interleukin-10 (IL-10) gene promoter for -1082 (A/G) and -592 (A/C) positions with the concentration of IL-10 in blood serum of Iraqi children with type 1 diabetes mellitus (T1D). Fifty blood serum samples collected from children with age ranged between 7-12 years. Thirty-five blood samples collected from patient children with T1D, and compared with 15 healthy children age matched as control sample. The results revealed decreasing in anti-inflammatory IL-10 concentration in T1D patient’s blood serum (0.068 Pg/ml) as compared with the control sample (0.111 Pg/ml). No significant differences were found in interleukin concentration between the studied samples when they analyzed with the M
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreThis research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreGiving advice refers to an attempt by the speaker to express what the addressee should do in a particular situation or what is good for him/her. It is also a feature of making social relations and communications move smoothly and become stronger. The current study aims to investigate the strategies of the speech act of advice by old females and males for the younger generation in written signs. Comparison is made between old females and males regarding their pragmatic use of advice and the way they are manifested in expressing gender identity differences. The sample of the study consists of (30) written signs of advice divided equally between the two gender groups. Hinkel’s (1997) classification of the strategies for perceiving th
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More