the study including isolation and identification of candida spp causing UTIs from patintes coming to al-yarmouk hospital
For the period from February 2014 till May 2014, one hundred and nine lactose fermenter clinical isolates from different samples (urine, stool, wound swab, blood, and sputum) were collected from Alyarmok, Alkadimiya, and Baghdad teaching hospitals at Baghdad governorate. Identification of all Klebsiella pneumoniae isolates were carried out depending on macroscopic, microscopic characterizations, conventional biochemical tests, and Api 20E system. Fifty-three (48.62%) isolates represented K. pneumoniae; however, 51.73% represented other bacteria. Susceptibility test was achieved to all fifty-three K. pneumoniae isolates using five antibiotic disks (Ceftazidime, Ceftriaxone, Cefotaxime, Imipenem, and Meropenem). Most of tested isolates (90
... Show MorePersistence of antibiotics in the aquatic environment has raised concerns regarding their potential influence on potable water quality and human health. This study analyzes the presence of antibiotics in potable water from two treatment plants in Baghdad City. The collected samples were separated using a solid-phase extraction method with hydrophilic-lipophilic balance (HLB) cartridge before being analyzed. The detected antibiotics in the raw and finished drinking water were analyzed and assessed using high-performance liquid chromatography (HPLC), with fluorometric detector and UV detector. The results confirmed that different antibiotics including fluoroquinolones and
A total of 200 samples (180 fecal materials and 20 organ samples) were collected from (5 different poultry farms, 10 local poultry shops, 5 houses poultry, 5 Eggs stores shops and 5hand slaughters centers) in Ibb city, Yemen, 2014. According to morphological, cultural, as well as biochemical characterization and serological tests, 59(29.5%) isolates were identified as Salmonella spp. and all Salmonella isolates were categorized by serotype, which comprised of, 37(62.71%) Salmonella Typhimurium serovar, 21(35.59%). Salmonella Enteritidis serovar and 1(1.69%) Salmonella Heidlberg serovar. Antibiotic sensitivity test was done for bacterial isolates and the results showed there were clear differences in antibiotic resistant. Antimicrobial
... Show MoreThe diagnosis of acute appendicitis (AA) sometimes is illusive and the accompanying clinical and laboratory manifestations cannot be used for definitive diagnosis. Objective: This study aimed to evaluate the diagnostic value of neutrophil/lymphocyte ratio (NLR) in detection of AA. Materials and Methods: This is a cross-sectional study that included a total of 80 adult patients with AA and 62 age- and gender-matched patients with abdominal pain due to causes other than AA. Three milliliter of peripheral blood were collected from each participant. The NLR was calculated by dividing the absolute neutrophil count by the absolute lymphocyte count. Receiver operating characteristic curve was used to assess the diagnostic value of NLR in detection
... Show MoreBackground: Chronic periodontitis defined as “an infectious inflammatory disease within supporting tissues of the teeth, progressive attachment loss and bone loss". Aggressive periodontitis is rare which in most cases manifest themselves clinically during youth. It characterized by rapid rate of disease progression .Pro-inflammatory chemokines organized inflammatory responses. Granulocyte chemotactic protein 2 is involved in neutrophil gathering and movement. The purpose of the study is to detect serum of Granulocyte Chemotactic Protein 2 and correlate to periodontal condition in patients with chronic periodontitis, Aggressive periodontitis and Healthy Control subjects and measurement the count of neutrophils for the studied groups. S
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More