MRSA is one of the major pathogens in hospitals and the community, which have the ability to produce biofilm as a virulence factor, the impact of chalcone on biofilm formation, the synergism effect of chalcone and antibiotic in both in vitro and in vivo experiments, the gene expression of virulence genes (srtA, fnbA, fnbB) before and after treatment of it on MRSA biofilm cells in vitro, all these were the prime aims of this study. Chalcone at MBIC (20 μg/ml), significantly reduced the biofilm formation to 21.45% and at sub MBIC (15 μg/ml) to 36.58 %. While, Chalcone at MIC(5 μg/ml) reduced MRSA planktonic cells to 49.61%. Susceptibility of MRSA isolates against eight antibiotics showed that all isolates were sensitive to vancomycin and none of the isolates developed susceptibility to erythromycin. The combinatorial effect of chalcone at 5 μg/ml and vancomycin at MIC of (1 μg/ml) on MRSA planktonic cells was reduced it from 70 to 23.3% , and in combination with erythromycin at 32 μg/ml, was decreased from 53.1% to 22% and the effect of chalcone at sub MBIC (15 μg/ml) when combined with vancomycin was reducing the biofilm formation from 87% to 27.6 and with erythromycin from 55.1% to 23.8%. Combinatorial phenotypic effect of the antibiotics and chalcone (at sub MBIC), in vitro came in line with the result of in vivo experiment and the results showed decrease in the expression of fnbA, fnbB and srtA genes in tested isolates in the presence of chalcone at sub MBIC. In our study, we demonstrated that chalcone exhibited significant effect in biofilm formation of MRSA strains, which can be considered as promising antimicrobial agents that can be used for prevention of MRSA adherence or as adjunct to antibiotics in conventional therapy.
Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.
We compare two methods Bayesian and . Then the results were compared using MSe criteria.
A simulation had been used to study the empirical behavior for the Logistic model , with different sample sizes and variances. The results using represent that the Bayesian method is better than the at small samples sizes.
... Show MoreReservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and
... Show MoreRecent studies have revealed some conflicting results about the health effects of caffeine. These studies are inconsistent in terms of design and population and source of consumed caffeine. In the current study, we aimed to evaluate the possible health effects of dietary caffeine intake among overweight and obese individuals.
In this cross-sectional study, 488 apparently healthy individuals with overweight and obesity were participated. Dietary intake was assessed by a Food Frequency Questionnaire (FFQ) and
Field experiment conducted to measure vibrations on three axes longitudinal X, lateral Y and vertical Z on steering wheel, platform tractor and vertical vibration in seat tractor and seat effective amplitude transmissibility (SEAT) factor during operation tillage in silt clay loam soil with depth 18 cm in Baghdad. Split – split plot design under randomized complete block design with three replications least significant design 5 % used. Three factor were used in this experiment included two types of plows included chisel and disc plows which represented main plot, three tires inflation pressure was second factor included 1.1 ,1.8 and 2.7 bar, and three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Resu
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreFlow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More