Viruses have not previously been reported to act as chemotactic/chemoattractive agents. Rather, viruses as extracellular entities are generally viewed as non-metabolically active spore-like agents that await further infection events upon collision with appropriate host cells. That a virus might actively contribute to its fate via chemotaxis and change the behavior of an organism independent of infection is unprecedented.
Changes in mechanical properties of material as a result of service in different conditions can be provided by mechanical testing to assist the estimation of current internal situation of these materials, or the degree of deterioration may exist in furnaces serviced at high temperature and exceed their design life. Because of the rarity works on austenitic stainless steel material type AISI 321H, in this work, ultimate tensile strength, yield strength, elongation, hardness, and absorbed energy by impact are evaluated based on experimental data obtained from mechanical testing. Samples of tubes are extracted from furnace belong to hydrotreaterunit, also samples from un-used tube material are used to make comparisons between these properti
... Show MoreAbstract
The aim of the research is to demonstrate the impact of long-term investment on profitability, and in order to achieve this goal, long-term investment was chosen, represented by (the ratio of long-term investments to total investments, the ratio of long-term investment to the total (deposits) as independent variables, and studying its impact on the dependent variable, which is profitability as measured by the rate of return on investments, the rate of return on equity. In order to reach the results, the inductive approach and the analytical descriptive approach were used, and the research found a significant impac
... Show MoreThe aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future p
... Show MoreThe study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreDoubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent. The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average weight of their word are constructed. Second, the degree of cl
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More