Towards an integrative view of virus phenotypes
...Show More Authors
Bombay (Oh) and Para-Bombay are rare variants of the ABO blood group system that carry significant clinical importance. They are characterized by the absence or a marked reduction in the expression of the H antigen on red blood cells (RBCs). This deficiency leads to a failure in the synthesis of A and B antigens, predisposing patients—particularly those with the Bombay phenotype—to developing potent anti-H antibodies, which can cause severe hemolytic transfusion reactions. Objective: The primary goal is to provide clinicians and laboratory specialists with a practical and comprehensive framework to prevent avoidable blood mismatch and improve clinical outcomes for patients suffering from H-deficient phenotypes. Methods: This rev
... Show MoreThe subject of the tagged research (becoming and integration of the film in postmodern cinema) is summarized by studying the transformations and complementarity of the film in light of the emergence of the concern of postmodernism. Then the need for it, as well as the objectives of the research and clarify its limits, as well as its importance. Then the transition to the theoretical framework, which included two sections, the first topic was entitled: Postmodern Cinema Formation and Completion, while the second topic was entitled: Paradox in Postmodern Film.
After completing the theoretical aspect, the research concluded with a number of theoretical framework indicators that were adopted as a tool for analyzing the sample, then th
... Show MoreThe feline calicivirus (FCV) is a highly contagious and infectious virus that infects cats and causes moderate to stringent respiratory infections and oropharyngeal illness. It is prevalent in shelters and birthplace colonies and frequently infects kitten cats. 50 distinct cats were involved in the research, with samples acquired between October 2020 and January 2021. Swabs were taken from the oropharynx and conjunctiva, conditional on the signs of FCV disease septicity, to inspect viral nucleic acid from collecting samples, then extract the RNA from the swabs and turn it into a cDNA particle, and finally distinguishing the open reading frame nucleic acid gene 2 using a primer special for feline calicivirus, All specimens were taken
... Show MoreObjective: determine the effectiveness of an education program on youth's level of awareness towards
household waste control.
Methodology: A Quazi-experimental study was conducted. Non-probability (quota sample) of (80) young
persons is selected from Baghdad Governorate. They are divided into two equal groups of (40) subjects for the
study group which is exposed to the household waste control educational program. The remaining is the
control group which is not exposed to the educational program.
Results: The findings of the study indicated that youth of the study group have got benefits from the
implementation of the educational program towards household waste control and change has occurred to
their awareness tow
Abstract\
The value chain analysis is main tools to achieve effective and efficient cost management; it requires a depth and comprehensive understanding for all internal and external activities associated with creating value. Supply chain as apart of value chain, that means managing it in active and efficient can achieve great results when adopting a comprehensive and integrated performance for these two chains activities. The research aims to identify possible ways to integrate the performance of value and supply chains of the sample" Kufa-cement plant" and determine the effect of this integration in enhancing customer value. The research arrival that logical and integrated analysis of value and supply chains helps
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreLung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-c
... Show More