This study aimed to detect of contamination of milk and local soft cheese with Staphylococcus aureus and their enterotoxins with attempt to detect the enterotoxin genes in some isolates of this bacteria. A total of 120 samples, 76 of raw milk and 44 of soft cheese were collected from different markets of Baghdad city. Enterotoxins in these samples were detected by VIDAS Set 2 system and it was found that enterotoxin A is present in a rate of 44.74% in milk samples and in a rate 54.50% in cheese samples. While other enterotoxins B, C, D, E were not found in any rate in any samples.
Through the study 60 isolates obtained from milk and cheeses were identified as Staphylococcus aureus by cultural, morphological and biochemical test by using API Staph Kits. These isolates were subjected to find out which of the genes of classical enterotoxins A, B, C, D, and E were they harbored using Multiplex PCR assay. It was revealed that 23 isolates have one or more of these genes and the gene of enterotoxin A is more distributed among these isolates in a frequency of 82.60%.
Most approaches to combat antibiotic resistant bacteria concentrate on discovering new antibiotics or modifying existing ones. However, one of the most promising alternatives is the use of bacteriophages. This study was focused on the isolation of bacteriophages that are specific to some of commonly human pathogens namely E. coli, Streptococcus pyogenes, Staphylococcus aureus, Proteus mirabilis, Pseudomonas aeruginosa, Salmonella spp. and Klebsiella pneumoniae. These bacteriophages were isolated from sewages that were collected from four different locations in Kirkuk City. Apart from S. pyogenes, bacteriophages specific to all tested bacteria were successfully isolated and tested for their effectiveness by spot test. The most effective
... Show Moreبعد الاحتجاجات التي اندلعت في ليبيا في فبراير 3122 ،استند مجلس الأمن وهيئات الأمم المتحدة الأخرى على مفهوم المسئولية عن الحماية (R2P )(لمعالجة الأوضاع الإنسانية الناجمة عن تلك الاحتجاجات. وأصدر المجلس القرار 1970والذي فرض بموجبه حزمة من العقوبات على ليبيا، ثم أصدر القرار 1973 الذي سمح بالتدخل العسكري هناك. وبعد البدء بتنفيذ الحملة العسكرية تبين أن الناتو استغل هذه القرارات لتنفيذ أجندته الخاصة وعمل على الإطاحة بالن
... Show MoreThroughout the ages, a number of natural and human disasters have
occurred in the Islamic world,
Abstract
The twentieth century French novel had undergo a significant change that took the form of a radical move from the traditional son who follows his father to one who no way prevalent in the classical French novel. The new son in the 2Oth century novel finds himself emotionally attached which both became a new trend and approach in novel writing.
Marcel Proust's novel which can be considered a source of inspiration for most of 2Oth century novelists is a good example of the mother supremacy which is crystal clear from the first page through its parts and chapters till the last page. In fact, Proust had written a completely different novel from the Balzacian conventions. Unlike the latter's novels, Pro
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreBackground: The purposes of this study were to determine the photogrammetric soft tissue facial profile measurements for Iraqi adults sample with class I normal occlusion using Standardized photographic techniques and to verify the existence of possible gender differences. Materials and methods: Eighty Iraqi adult subjects (40 males and 40 females) with an age ranged between 18-25 years having class I normal occlusion were chosen for this study. Each individual was subjected to clinical examination and digital standardized right side photographic records were taken in the natural head position which is mirror position which the patient looking straight into his eyes into the mirror mounted on the stand. The photographs were analyzed using A
... Show More