Respiratory tract infections in sheep are among the important health problems that affect all sheep ages around the world. Nine bacterial isolates obtained from sheep with respiratory tract infections were selected to be used in the current study. The isolates included 3 Staphylococcus aureus, 4 Klebsiella pneumoniae, and 2 Pseudomonas aeruginosa. Following the primers design by the Primer3Plus software tool and optimization of the conventional polymerase chain reaction (PCR), the primers were validated for their use in the multiplex PCR experiments. The MFEprimer program was used to check the suitability of the primer set combinations for multiplex PCR. The MFEprimer software was successful in designing the multiplex-PCR experiments and determining the optimal primer set combinations. Multiplex PCR was able to amplify specific DNA sequences of one, two or three target genes of these mixed microorganisms in the same PCR reaction tube. This technique efficiently detected combinations of two organisms, either S. aureus with K. pneumoniae, S. aureus with P. aeruginosa or K. pneumoniae with P. aeruginosa. Moreover, multiplex PCR was also able to detect the presence of the three organisms together in the same reaction tube. To conclude, this study confirmed multiplex-PCR as a specific, sensi- tive, rapid, accurate, and cost-effective molecular diagnostic method for identification and differentiation of three clinically important bacteria associated with sheep respiratory tract infections, including S. aureus, P. aeruginosa, and K. pneumoniae. This can efficiently support control and treatment of such diseases and would increase the economy of the animals’ owners and wellbeing of the animals.
This paper presents the synthesis and study of some new mixed-ligand complexes containing nicotinamide(C6H7N2O) symbolized (NA) and phenylalanine (C9H11NO2)symbolized (pheH)] with some metal ions. The resulting products were found to be solid crystalline complexes which have been characterized by :Melting points, Solubility, Molar conductivity. determination the percentage of the metal in the complexes by flame(AAS), magnetic susceptipibility, Spectroscopic Method [FT-IR and UV-Vis]. The proposed structure of the complexes using program , chem office 3D(2006) . The general formula have been given for the prepared complexes : [M(NA)2(phe)]cl M(II): Mn(II) ,Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) & Hg(II)). NA = Nicotinamide= C6
... Show MoreThis paper presents the synthesis and study of some new mixed-liagnd complexes containing nicotinamide(C6H7N2O) symbolized (NA) and phenylalanine (C9H11NO2)symbolized (pheH)] with some metal ions. The resulting products were found to be solid crystalline complexes which have been characterized by :Melting points, Solubility, Molar conductivity. determination the percentage of the metal in the complexes by flame(AAS), magnetic susceptipibility, Spectroscopic Method [FT-IR and UV-Vis]. The proposed structure of the complexes using program , chem office 3D(2006) . The general formula have been given for the prepared complexes :[M(NA)2(phe)]cl M(II): Mn(II) ,Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) & Hg(II) . NA = Nicotinamide= C6H7N2O Phe -
... Show MoreThis work concerns the thermal and sound insulation as well as the mechanical properties of polymer matrix composite reinforced with glass fibers. These fibers may have dangerous effect during handling, for example the glass fibers might cause some damage to the eyes, lungs and even skin. For this reason the present work, investigates the behavior of polymer composite reinforced with natural fibers (Plant fibers) as replacement to glass fibers. Unsaturated Polyester resin was used as matrix material reinforced with two types of fibers, one of them is artificial (Glass fibers) and the other type is natural (Jute, Fronds Palm and Reed Fibers) by hand lay-up technique. All fibers are untreated with any chemical solvent. The Percentage of mi
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show More