The virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo
... Show MoreMedulloblastomas and ependymomas are the most common malignant brain tumors in children. However genetic abnormalities associated with their development and prognosis remain unclear. Recently two gene fusions, KIAA1549–BRAF and SRGAP3–RAF1 have been detected in a number of brain tumours. We report here our development and validation of RT-RQPCR assays to detect various isoforms of these two fusion genes in formalin fixed paraffin embedded (FFPE) tissues of medulloblastoma and ependymoma. We examined these fusion genes in 44 paediatric brain tumours, 33 medulloblastomas and 11 ependymomas. We detected both fusion transcripts in 8/33, 5/33 SRGAP3 ex10/RAF1 ex10, and 3/33 KIAA1549 ex16/BRAF ex9, meduloblastomas but none in the 11 ep
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground: Osteoporosis is denoted by low bone mass and microarchitectural breakdown of bone tissue, directing to increased fracture risk and bone fragility. Fractures may lead to a decreased quality of life and increased medical costs. Thus, osteoporosis is widely considered a significant health concern.
Objective. This study aimed to compare quantitative computed tomography (QCT) and dual-energy X-Ray absorptiometry (DXA) to detect osteoporosis in postmenopausal women.
Subjects and Methods. We measured spinal volumetric bone mineral density (BMD) with QCT and areal spinal and hip BMD with DXA in 164 postmenopausal women. We calculated the osteo
... Show MoreInflation is one of the important issues that the economic authorities in all countries of the world care about, where the loss of money for its function is one of the most important and largest inflationary effects that this phenomenon leaves on the economy, and Iraq, like other countries, has had its share of the problem of inflation for a long time due to the circumstances that He went through it, whether it was the wars he fought or the economic blockade that was imposed on him in the nineties of the last century. Economically, the problem of inflation is addressed through the use of fiscal policy tools, including tax increases in order to abso
... Show MoreThe main risks arising from the WTO Agreement are the inequality and lack of competitiveness of most pharmaceutical goods, as well as the fact that Iraq is a net importer of medicines that are at the core of consumer needs, The subject matter of the Convention on the Protection of Intellectual Property Rights and its implications for the pharmaceutical industry, in particular, coinciding with the situation of financial and administrative corruption, all of which has resulted in drug fraud in the Iraqi market and its impact on public health. The control of medical technology, the persistence of the technological gap and its effects on high price levels, and the fact that domestic drug producers are obliged to obtain production licenses from
... Show MoreCompanies need to educate people about the facts that characterize the business. This is the mission of promotion, it is an important marketing activity, promotion communicates with others and seeks to provide customers with a new business process experience.
Advertising is the most important methods of promotion and the best way to reach an audience. Once the organization advertises its products and services, it can operate in a competitive environment. Marketing competition requires knowledge of humanity that must be affected and convinced. Advertising should create Desires and need for satisfaction. This research comes in the study of visual representations of this psychological incident and how to use it communicatively to create
The current research aims to identify the extent to which cognitive economics skills are included in the content of the chemistry textbook for the third intermediate grade, and the research sample was represented in the chemistry textbook for the third intermediate grade. A list of knowledge economy skills was prepared (6) main skills (basic skills, communication skills, thinking skills, work skills Group, information-gathering skill, behavioral skills (and (20) sub-skills) (reading, writing, operations, computer skills and employability, oral expression and written communication, dialogue, persuasion, influence and arousal, analysis, problem-solving, decision-making, suggestions and hypotheses and employing them. Controlling, directing
... Show MoreThe purpose of this paper is to preparing exercises for using the (Blazepod) device for advanced basketball players, and then identifying the effect of using the (Blazepod) device in developing some of the player's defensive movement for advanced basketball players. 12 players from the Adhamiya Sports Club, the category of applicants for the 2022/2023 sports year, where they were chosen in a deliberate manner from the community of origin represented by clubs, and the researchers used the defender player's movement test, and the results of the study showed that the special exercises prepared by the researcher using the (Blazepod) device affected the development Defensive skills (the movement of the defending player) greatly increased among a
... Show More