A total of 200 clinical samples included Burns and Wounds infections were collected from Baghdad Governorate. Results showed that rate all isolates of P. mirabilis was 31(15.5%) and rate of Burns infections was 14 (45%) and rate of wounds infection 17 (55%). Where was diagnostic based on conventional biochemical tests and confirmed by the Vitek-2 Compact system and the specific primer of the16SrRNA gene, the ability of bacterial isolates to biofilm formation to be studied. It's considered an important virulence factor in Incidence of diseases and play important role in increasing resistance to antibiotic of encased bacteria, by two methods Congo Red Agar method and Microtiter Plate method. The Congo Red Agar method showed that most isolates gave positive results of 27 isolates (87%) and in varying ratio, whereas the Microtiter Plate method showed that all P. mirabilis isolates were Biofilm formation (100%) and in different ratio. The urease enzyme was detected as one of the most important virulence factors that P. mirabilis possessed by Ure C gene and through molecular technique polymerase chain reaction (PCR), where it was found that 29 isolates (93.5%) out of 31 isolates gave a positive result to having the Ure C gene.
A general mathematical model for a fixed bed immobilized enzyme reactor was developed to simulate the process of diffusion and reaction inside the biocatalyst particle. The modeling and simulation of starch hydrolysis using immobilized
Background: The new concepts and technologies continue to change the dynamics of endodontic practices in the world. Rapid and significant changes in techniques, instrument design, and the type of metals used to manufacture endodontic instruments which have been made during the last few years in an attempt to overcome canal preparation errors. The purpose of this study is to measure and compare canal transportation and centering ability of Self Adjusting File with two rotary nickel-titanium (Ni-Ti) systems, ProTaper and BioRaCe at different levels. Material and Methods: Forty five distal roots of mandibular first molars with moderate curvature were selected using Schneider method. Roots were divided randomly into 3 groups of 15 each and were
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreHepatitis B and Hepatitis C viruses are the major health problem in the worldwide. In the Middle East, the prevalence of HBV in general population with the chronic infectionsis 2-5%,whereas the prevalence of HCV is about 1% in Arabian Gulf countries. World Health Organization (WHO) revealed that the risks of HBV and HCV transmissionas well as human immunodeficiency virus (HIV) through the transfusion of contaminated blood and blood products is high, because of the fragility of health services in these countries. Several viral diseases are transportby different modes like bloodtransfusion, sexual contact, and unsafe injections. The mostcommon blood-transmitted viruses are hepatitis B virus(HBV), hepatitis C virus (HCV) and humanimmunodeficie
... Show MoreBackground: Acute urinary tract infection is a common bacterial infection causing illness in infants and children. At age of seven, 8% of girls and 2% of boys will have at least one episode. Although drinking water and using home remedies are known to help to flush away bacteria and keeps them from sticking to the bladder wall, researches to test the efficacy and safety of hydrochlorothiazide's diuretic effect as adjuvant to the antibiotics in pediatric age groups are lacking, and so this research was to address this subject.
Objectives: To assess the effectiveness and the safety of hydrochlorothiazide as adjuvant therapy to the antibiotics in treating acute urinary tract infect
... Show MoreBackground: Ear infections can manifest in many forms depending on site of infection whether external, middle or internal ear and the culprit pathogen whether viral, bacterial or fungal. Acute middle ear infections are usually accompanied by aural discharge. Objective: 1. To get an overview on the bacterial pathogens involved in ear infections. 2. To assess the antibiotic resistance of bacterial pathogens. Methods: A cross sectional study conducted in Al-Kindy Teaching Hospital / Baghdad /Iraq. Swabs taken from 225 patients suffering from aural discharge were tested for culture and sensitivity for the duration of two years 2018-2019. Aural discharge is cultured by inoculating it into blood, MacConkey agar, chocolate agars and Sabou
... Show MoreCertain bacterial and viral infectious agents may play a role in the activation of inflammation in atherosclerosis lesions. Epidemiological studies indicate that infectious agents may predispose patients to atherosclerosis as Infections have been associated with an increased risk of this disease. Moreover, a positive antibody status has been detected against some infectious organisms associated with atherosclerotic rupture. Infectious agents found in human atheroma, which may directly cause or accelerate atherosclerosis , include many pathogens but the present study focused on Helicobacter pylori, hepatitis B virus surface antigen and C. In order to evaluate the possible association between H. pylori, HBV, and HCV infections and the risk of
... Show More