Detection of the chuA gene encoding the invasive enterohemorrhagic species Escherichia coli 0157:H7 using qPCR in horse feces samples on Sumbawa Island, Indonesia

利用qPCR技术检测印度尼西亚松巴哇岛马粪样本中编码侵袭性肠出血性大肠杆菌O157:H7的chuA基因

阅读:1

Abstract

BACKGROUND: Bacterial identification can be done using various testing techniques. Molecular techniques are often used to research dangerous diseases, an approach using genetic information on the pathogenic agent. The enterohemorrhagic invasive species Escherichia coli 0157:H7 was identified from the feces of working horses on the island of Sumbawa. Another advance in molecular technology is genome amplification with qPCR which is the gold standard for detecting E. coli. AIM: This study aims to detect and identify the invasive species E. coli 0157:H7 using the gene encoding chuA with the qPCR method sourced from horse feces. METHODS: Fresh fecal samples from horses on Sumbawa Island were isolated and identified, then continued with molecular examination using the gene encoding chuA using the qPCR method. RESULTS: qPCR testing in this study showed that six sample isolates that were positive for E. coli 0157:H7 were detected for the presence of the chuA gene, which is a gene coding for an invasive species of E. coli bacteria. The highest to lowest Cq values and Tm from the qPCR results of the sample isolates were 15.98 (4KJ), 14.90 (19KG), 14.6 (3KJ), 13.77 (20KG), 12.56 (5KGB), and 12.20 (6KJ). Tm values are 86.7 (4KJ), 86.69 (3KJ), 86.56 (5KGB), 85.88 (20KGB), 85.81 (19KG), and 85.74 (6KJ). CONCLUSION: Validation, standardization of the development, and modification of qPCR technology must be carried out to harmonize testing throughout to avoid wrong interpretation of the test results so that the determination of actions to eradicate and control diseases originating from animals in the field does not occur.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。