One of the crucial public health problems worldwide is the urinary tract infections (UTIs) that are derived from uropathogenic bacteria (UPBs). Slime layer is known to have the ability to permit bacteria to achieve smooth surfaces attachment like catheters and prosthetic implants which in turn, facilitate biofilm formation and may cause lethal infections. On the other hand, Extended-spectrum beta-lactamase (ESBL) production is considered a growing concern among UPBs due to the limiting of the treatment options and contributes to resistance toward antibiotics. The principal study's point is the finding out the slime layer and ESBL production in Escherichia coli and Klebsiella pneumoniae of uropathogenic origin. Ten ready isolates (five isolates for each bacterial type) are gained from Department of Biology, College of Science, University of Baghdad. Disk diffusion method is employed to detect their antibiotic susceptibility towards Ciprofloxacin (CRO 10μg), Ceftazidime (CAZ 30μg) , Imipenem (IPM 10μg), Meropenem (MEM 10μg), Amoxicillin/ clavulanate (AMC 20/10 μg) and Aztreonam (ATM 30μg). Congo Red method is used to detect the production of slime layer for both types of bacteria. Black colonies mean slime layer production and pink colored colonies are not productive. Results show that all the tested bacterial isolates had ability to form slime layer even in different degrees. By using disk replacement method, ESBL production is detected. Results showed that two isolates (40%) of both Escherichia coli and Klebsiella pneumoniae are ESBL producers, while (60%) of both types are unable to produce these enzymes.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreJurisprudence of Imam women through Susan Book of blood money
The current research seeks to Analyze third intermediate chemistry book following sustainable development standards for academic year (2016-2017). To do this, a list of sustainable development standards that should be included in chemistry book was designed based on the previous studies. The first version of the list consisted of (50) sub-case divided into three standards (social, economic, and environmental) which was exposed to group of experts in teaching chemistry and teaching methods. The list has modified to (43) sub-case. The researcher followed the implicit and explicit meaning in his analysis: one for recording and repetition and the other for frequency. The result showed that third intermediate chemistry book has achieved (20)
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreIt is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.
The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of
... Show MoreBackground: Since the periodontal disease Index of Ramfjord (Ramfjord index) can potentially shorten the examination time by almost half, many studies evaluated Ramfjord teeth in predicting full-mouth periodontal status of an adult population. The aim of this study was to evaluate the benefit of Ramfjord teeth in predicting the full-mouth clinical attachment level of an adult population in patients attending the college of dentistry- Baghdad University. Materials and methods: The study participants were 100 patients with age range from 30-60 years old which represent group zero. The patients were divided into three main groups according to the age of the patients. Group I and group II each of them composed of 30 patients while group III co
... Show More