Uropathogenic specific protein is a genotoxic protein targeting the DNA, leading to mutations and modifications in the normal cell's DNA and subsequently, cancer development. This study aims to determine the prevalence of the usp gene in Uropathogenic Escherichia coli isolated from females with urinary tract infections and study its correlation with biofilm formation. One hundred and five urine specimens were collected from female patients (20 to 55 years old) with urinary tract infections attending hospitals. Traditional laboratory methods using selective and differential culture media were used for initial bacterial isolation and identification, and molecular techniques that targeted a segment of the 16SrRNA gene with a specific primer pair were used to confirm the bacterial identification and usp gene detection using a conventional polymerase chain reaction. A microtiter plate method was used to assess the ability of isolates to produce biofilm. The bacterial isolation and identification results revealed (54.28%, 57/105) of isolates were Escherichia coli. The results of molecular detection of the usp gene revealed a considerable prevalence (98.2%, 56\57) in Uropathogenic Escherichia coli and a 100% ability to form a biofilm. The isolates exhibited different biofilm formation abilities, with a higher ability to form strong biofilm (42%, 24/57) followed by moderate and weak biofilm formation (35%,20/57) and (23%, 13/57), respectively. However, no statistical correlation between the usp gene and different abilities for biofilm formation has been found. The study’s limitation is that there is a small number of specimens due to the difficulty in specimen collection. In conclusion, the high prevalence of the usp gene in Uropathogenic Escherichia coli, although it does not correlate with biofilm, suggests its essential role in bacterial pathogenicity and the possibility of cancer disease in females with UTIs.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Communities seek to achieve the economic growth through the optimal use of resources. The human resource is considered the most important of those resources where the insurance institutions take the larger role in the protection of this resource and reducing the impact caused by dangers realization that endures. The general Iraqi insurance company is considered the leading in the field of life insurance since it was founded, and until now.
This research is based on an analyzing the relation between premiums and compensations of life insurance, for individual and the group insurance, and a reality of the
... Show MoreThe success of any institution must be based on means to protect its resources and assets from the waste, loss, misuse and the availability of accurate and reliable data by accounting reports to increase its operational efficiency, namely, that the internal control system is considered as a safety valve for top management in any economic unit. The problem is represented by the need for an efficient system, so to ensure its success, there must exist external parties which monitor and evaluate the performance because of its importance by following clear criteria. So, the research problem came to address performance evaluation indicators which are set by the Federal Board of Supreme Audit (FBSA) and identify the extent of its contribution t
... Show MoreA true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
The financial statements must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74) 2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2 concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision at a rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years .also from the significance of the issue of real estates that become a property of banks as a result of debt settlement and the pr
... Show MoreIn this study, we investigate about the run length properties of cumulative sum (Cusum) and The exponentially weighted moving average (EWMA) control charts, to detect positive shifts in the mean of the process for the poisson distribution with unknown mean. We used markov chain approach to compute the average and the standard deviation for run length for Cusum and EWMA control charts, when the variable under control follows poisson distribution. Also, we used the Cusum and the EWMA control charts for monitoring a process mean when the observations (products are selected from Al_Mamun Factory ) are identically and independently distributed (iid) from poisson distribution i
... Show More