In this study we surveyed the dominant normal stool flora of randomly selected healthy, young (18-23 years old), unmarried (doctrinal) Iraqi college students (males and females) for the carriage of extraintestinal pathogenic E. coli (ExPEC). ExPEC virulence was detected phenotypically by mannose resistant hemagglutination of human red blood cells (MRHA) and mannose sensitive (MS) agglutination of Bakers' yeast (Saccharomyces cerevisceae). From 88 college students, 264 E. coli isolates were obtained (3 isolates per person): 123 from 41 females and 141 from 47 males. Of these isolates, 56% (149/264) caused MS agglutination of yeast cells and 4.16% (11/264) showed MRHA. Eighty two percent (9/11) of the isolates with MRHA also caused MS agglutination of yeast cells. Statistically the difference is not significant (P < 0.05) among males and females regarding the MS agglutination of yeast cells: 59% (72/123) of females' isolates vs. 55% (77/141) of males' isolates. Conversely, the difference is clear regarding the carriage of isolates with MRHA. All the isolates with MRHA were distributed among females' dominant stool flora (11/123: 8.94%) whereas none of the males' dominant stool flora showed MRHA (0/141: 0%). Five females out of 41 (12.19%) had isolates with MRHA. All the three isolates in 2 of these 5 females showed MRHA, 2 isolates in another 2 showed MRHA, and only one isolate in 1 female caused MRHA. Therefore we can say that the difference among males and females in fecal carriage of E. coli ,with characteristics of ExPEC, can be a predisposing factor of females to ExPEC infections more than males.
The normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the t
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreTo determine the relationship between Helicobacter pylori infection and skin disorders, sixty six patients who suffering from skin diseases include chronic urticarial (CU) and atopic dermatitis (AD) who attended at Dermatological Clinic/ Al-Numan Teaching Hospital from the beginning of October 2015 to the end of January 2016 with age (6-62) have been investigated and compared to twenty two samples of apparently healthy individuals were studied as control group. All the studied groups were subjected to measurement of antiHelicobacter pylori IgG antibodies by enzyme linked immuno sorbent assay (ELISA) and detection of 16S rRNA and CagA genes by using singleplex and multiplex PCR methods. The results of current study revealed that there was a
... Show MoreA procedure for the mutual derivatization and determination of thymol and Dapsone was developed and validated in this study. Dapsone was used as the derivatizing agent for the determination of thymol, and thymol was used as the derivatizing agent for the determination of Dapsone. An optimization study was performed for the derivatization reaction; i.e., the diazonium coupling reaction. Linear regression calibration plots for thymol and Dapsone in the direct reaction were constructed at 460 nm, within the concentration range of 0.3-7 μg ml-1 for thymol and 0.3-4 μg ml-1 for Dapsone, with limits of detection 0.086 and 0.053 μg ml-1, respectively. Corresponding plots for the cloud point extraction of thymol and Dapsone were constructed
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreType-1 diabetes is defined as destruction of pancreatic beta cell, virus and bacteria are some environmental factor for this disease. The study included 25 patients with type-1 diabetes mellitus aged between 8 – 25 years from Baghdad hospital and 20 healthy persons as control group. Anti-rubella IgG and IgM, anti-Chlamydia pneumonia IgG and IgM were measured by ELISA technique while anti-CMV antibody were measured by immunofluorescence technique. The aim of current study was to know the trigger factor for type-1 diabetes. There were significant differences (P<0.05) between studied groups according to parameters and the results lead to suggest that Chlamydia pneumonia, CMV and rubella virus may trigger type-1 diabetes mellitus in Iraqi pat
... Show More