The expanding of the medically important diseases created by multidrug-resistant Acinetobacter baumannii warrants the evolve a new methodology for prevention includes vaccination and treatment. Totally of forty-five clinical isolates identified as A.baumannii were obtained from hospitalized patients from three hospital in Baghdad City during the period from February 2016 to August 2016. Followed by diagnosing using different methods. Every strain was tested for susceptibility testing also some important virulence factorswere detected. Two isolates were chosen for the immunization and vaccine model, the first one remittent for most antibiotics except one are too virulence (strong) and the second is less virulent and resistance (weak).Enzyme-linked immunosorbent assaywas used for assessments of Toll like receptor 4,and Toll like receptor 2 concentrations in mouse serum at 14, 21 and 28 days of immunization. Results proved that the strong isolate showed resistance to all antibiotics except one and positive to all virulence factors except one, while the weak isolate resistance to Ceftriaxone, Cefotaxime, positive to tow virulence factors. Mice were intramuscular inoculated with strong and weak isolate. There are high significant differences when using strong A.baumannii strong in the level of TLR4 and there was not an important variation among the use of strong and weak isolation in the level of TLR2.Finaly,the yield refers to the TLR4 plays a key role in innate sensing with multidrug resistance isolate immunization, whereas TLR 2 shows it gives the same level of stimulation during immunization with both strains but lesser concentration than TLR4, so the inactivated with MDR isolate has a potential for development as a candidate vaccine for strong protection against MDR isolate infections.
The phenomenon of informal building Spread recently in Iraqi residential areas, in general, and in Baghdad, in particular, due to the urgent housing need, on the one hand, and lack of commitment to building controls, on the other hand, to highlight the phenomenon of uncommitted building to controls and housing governing legislation in Iraq, leading to heterogeneity in both building densities and plot areas, and disorder in the urban fabric and urban escape of those areas. Research problem identified as the absence of a clear vision about the General aspects of the phenomenon of informal building in residential street scene, and the role of designed housing projects as a substitute for informal building in built residential areas. The des
... Show MoreThe field study of this paper focused on the motives for lawyers to use the website
of the Supreme Judicial Council, and the gratifications achieved as a result of its use.
This study sought to achieve a number of goals, including:
1. Monitoring the patterns of lawyers’ use of the website of the Supreme Judicial Council.
2. Determining the forms that lawyers use to interact on the website of the Supreme
Judicial Council.
This study is a descriptive in kind as the researcher relied on the ‘survey method’ in
its study of the external audience (lawyers) using the questionnaire and scale toolThe questionnaire was distributed among a deliberately chosen sample, consisting of
(160) lawyers who used the website of
This present study is aimed at deciding the impact of exercises adapted to the ranges of movements of the arm on the performance of javelin throwing. As long as javelin throwing is quite a complex athletic event that presupposes a considerable amount of strength, speed, and biomechanical accuracy, it is crucial to learn whether the exercises designed to target the peculiarities of arm movements can have a positive effect on the performance of javelin throwers. To the study, experimental research with a single group of six youth javelin throwers was carried out. Before and after the eight-week training program, the pre-tests and post-tests were conducted to find the results of training with a specific focus on resistance exercises. Significa
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreBackground: Chemokine (C-X-C motif) ligand (CXCL9) has an important role recruiting the T-lymphocytes and immune response after infection by inducing T-cells accumulation around the areas associated with infections. However, this role is poorly known in relation with Toxoplasma gondii infection and also in association with thyroid hormones, which the present study is focused on. Methods: Eighty-seven women were included in this study for the period between September 2021 and February 2022. Blood samples of uninfected healthy pregnant, in addition to aborted and pregnant women infected with toxoplasmosis, were collected. Sera were then obtained and stored at -10°C. Toxo-latex agglutination test was done, followed by detec
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThis study included the estimation of growth rate, viability and morphological changes in different culture media (NNN, P-Y, RPMI- 1640, and Panmed). Promastigotes cultured in RPMI-1640 showed maximal growth rate after (2, 4, 6) days of cultivation (27.26 ± 0.05), (172.20 ± 0.1) and (343.81 ± 1.48) million parasites / ml for each day respectively, while P-Y media gave the highest mean of growth rat after (8 and 10) days of cultivation (307.16 ± 1.67) and (303.5 ± 4.96) million parasites / ml for each day respectively. P-Y medium showed the maximal percentage of viability after (2, 4, 6, 8, and 10) days of cultivation (99.76 ± 0.5) %, (98.30 ± 0.17) %, (96.1 ± 0.1) %, (92.5 ± 0.52) % and (87.26 ± 0.05) % for each day respectively.
... Show MoreThe kaizen is considered as one of the most important modern techniques which has been adopted by various economics entities especially manufacturing firms and its beginnings return to the middle of the earlier century that has been used by companies like Toshiba, Matsushita Electric, and Toyota. Which realized that these modern techniques would make a total change in the competitive environment and started qualifying and its staff in such away that enables them to go along with this unique environment. The continuous improvement (Kaizen) depends on the small continuous improvements in the product and the production operations during the production stage. Consequently, the research problem is represented in the improperly of the budg
... Show More