Methicillin resistant Staphylococcus aureus (MRSA) is one of the principal nosocomial causative agents. This bacterium has the capability to resist wide range of antibiotics and it is responsible for many diseases like skin, nose and wounds infection. In this study, randomly amplified polymorphic DNA (RAPD)-PCR was applied with ten random primers to examine the molecular diversity among methicillin resistant Staphylococcus aureus (MRSA) isolates in the hospitals and to investigate the genetic distance between them. 90 Isolates were collected from clinical specimens from Iraqi hospitals for a total of 90 isolates. Only 10 strains (11.11%) were found to be MRSA. From these 10 primers, only 9 gave clear amplification products. 91 fragment lines were generated from these primers across all isolates with an average of 10 fragment lines per primer. Of these, 90 (99%) were polymorphic. The size of the amplified bands ranged between 145-2109 bp. The polymorphism percentage for all primers was 100% except OP-X17 primer which gave 86% polymorphism. The genetic distances revealed from Jaccard similarity index was calculated for the 90 RAPD polymorphic fragment lines. The highest genetic distance value 0.959 was between isolate number (1) and (5) and between isolate number (3) and (10), while the lowest genetic distance value 0.218 was between isolate number (6) and (7). This study shows that RAPD-PCR technique assayed with nine primers can be successfully applied to reveal the genetic distances among methicillin resistant Staphylococcus aureus (MRSA) isolates from different hospitals.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreCryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand
... Show MoreContent-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreBackground: The interest in herbal extracts as antimicrobial agents has increased over the past few years in endodontic therapy. Nasturtium officinale (watercress) is a promising plant with great medicinal values. This study aimed to investigate the antifungal activity of watercress oil in combination with calcium hydroxide against Candida albicans as intracanal medicament. Materials and Methods: Candida albicans was isolated from patients with necrotic root canal or failed root canal treatment. The sensitivity of Candida albicans to different concentrations of watercress oil extract was determined by using the agar well diffusion method in comparison with calcium hydroxide paste. The agar plate method was used to determine the minimum fung
... Show MoreUropathogenic Escherichia coli is the main cause of urinary tract infections, the ability of this bacteria to cause urinary tract infections is related to a variety of virulence factors that enhance colonization and evade the immune response, one of these virulence factors is cytotoxic necrotizing factor 1 toxin which converts the glutamine residue to glutamic acid to activated GTPase Rho family. The study was meant to find out the prevalence rate of the cnf1 gene in Uropathogenic Escherichia coli isolated from Iraqi patients. Conventional laboratory methods were used for primary bacterial identification and molecular methods were used to confirm bacterial identity and gene detection. Escherichia coli was identified in 89/165 (53.93%) of th
... Show MoreSome geological phenomena as landslides and the mobilization of the accumulated rocks or soil are discussed in this research by using projectiles that cause mobility and falling of these land masses which are present at the top of mountains and edges of roads and streets to avoid accidents and human disasters which will occur if they are left falling by effect of climate or vibrating factors that are produced by performing dams, bridges and reservoirs. According to the different divisions of land masses groups, primary and secondary, which depend on type of movement and material arrangement that form the mobile masses, this research had shown the effect of projectiles for every type of cannons on the mobility of every groups of these rocks
... Show MoreThere are a number of obstacles in the field of work of social workers that prevent them from performing their full role. Their tasks may sometimes be easy and manageable and at other times they may be difficult and complex, however professional roles are mostly the latter, contribute to the feeling of the inability to provide the work required at the level expected by others. In such cases, the relationship binding specialists to their work is affected negatively and this has devastating effects on the professional process as a whole, including their professional practice. This feeling of helplessness and depletion of energy and effort leads to a state of fatigue and emotional exhaustion that can be defined as job burnout, our study aims t
... Show More