The complete genome sequence of bacteriophage VPUSM 8 against O1 El Tor Inaba
The aim of study to evaluated cinnamic acid and its activity on complete blood count(RBC,WBC,HG,HCV,MCH,MCHC and Plat.)and removed the cytoxan damage which caused bone marrow failure and leukemia and other that due to linked the cytoxan in 7- nitrogen of guanine based of DNA that lead to dead cells. Two concentration from pure cinnamic acid (5.6, 2.8 mg ? mice weight) in first step to choice the perfect concentration in comparison with each negative control ,positive control of cytoxan and the comparison group represent vitamin C. The second step to understand cinnamic acid mechanism activity towards cytoxan by used pre- cytoxan and post – cytoxan in interaction with perfect concentration of cinnamic acid dose (2.8 mg ? mice we
... Show MoreThis study was for searching for Cholera Bacteria serotype which causes epidemiology Cholera in the 2007 in a fast method which contains (Rapid Visual Test) (Crystal V.C.) which was used for the first time in Iraq to diagnosis of Cholera Bacteria & compared with the traditional bacteriology method. The Cholera disease is one of the most dangerous epidemiological diseases which lead to death with a percentage of (50 – 70) % in the severe cases for untreated patients . For this purpose, 100 samples of stool from the patients from a (13) hospitals in Baghdad Governorate in the period from August to the end of December. The Cholera was diagnosis in two methods, 1st method was the fast method using the nitrocellulose which is coated with anti-
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreImportant points were concluded from this analysis related with the presence of the same variable CEs within multiple isolates with different time points being under the selection and the location of SNPs within the conserved functional pattern of CEs. In the 40 isolates, 9 out of 39 variable CEs conducted with multiple isolates
El presente trabajo se refiere al tema del artículo indeterminado, que es importante no sólo para los traductores, sino para los alumnos de la lengua española en la Universidad de Bagdad. Tanto en el árabe como en el español, se usa el artículo en la lengua. Esta idea de trabajo surge de la necesidad de los estudiantes iraquíes para entender el uso y significado de los artículos indeterminados. Muchas veces, me preguntan a qué se refiere este artículo indeterminado en esta frase. Por tanto, esta idea surge para redactar un artículo sobre el tema
The genic variation analysis of Pseudomonas aeruginosa after filtering the spurious variation appeared that 222 variable loci out of 5572 loci were detected. The type of variation analysis revealed that single nucleotide polymorphism was highly significant compared with other types of variation due the fact that the genome variation was achieved on the level of microevolution. Moreover, the proportional effect of functional scheme showed that genes responsible for environmental information were the highest comparable to another scheme. The genes of environmental information processing locate on outer membrane and face the defense strategy of the host therefore change in proteins coded by these genes lead to escape the immune system defense
... Show MoreLawful protection of the human gene conceded a moral concern regarding the future of existence human. After the discovery of the human genetic map, scientific experiments and research related to the human gene increased, negative applications of genetic engineering in particular that violate essential human rights, the right to human dignity to be specific. These practices represent actual challenges to the existence and diversity of current and future generations. Therefore, the presence of legal rules at the domestic and global levels is an absolute necessity to prohibit these threats and determine civil and criminal accountability for those who infringe any laws related to this issue.
The team of this investigation deals with phraseology and the importance of its organized use in the media of communication, especially in the daily newspaper which is used by different society classes.
So, the journalist
... Show MoreThis paper discusses the limitation of both Sequence Covering Array (SCA) and Covering Array (CA) for testing reactive system when the order of parameter-values is sensitive. In doing so, this paper proposes a new model to take the sequence values into consideration. Accordingly, by superimposing the CA onto SCA yields another type of combinatorial test suite termed Multi-Valued Sequence Covering Array (MVSCA) in a more generalized form. This superimposing is a challenging process due to NP-Hardness for both SCA and CA. Motivated by such a challenge, this paper presents the MVSCA with a working illustrative example to show the similarities and differences among combinatorial testing methods. Consequently, the MVSCA is a
... Show More