Preferred Language
Articles
/
KxbWTYcBVTCNdQwCW0NH
The Deubiquitylase USP5 Knockdown Reduces Semliki Forest Virus Replication in HeLa Cells
...Show More Authors

Semliki Forest Virus (SFV), a member of the Alphavirus genus in the Togaviridae family, is a small-enveloped, positive-sense single-stranded RNA (+ssRNA) virus. The virus is spread by mosquitos and can infect humans, resulting in mild febrile disease with symptoms that include fever, myalgia, arthralgia, persistent headaches and asthenia.  Virulent strains of SFV in mice cause lethal encephalitis by infecting neurons in the central nervous system. In on-going experiments in the research group using a focused siRNA screen we have investigated the role of deubiquitylases (DUBs) during SFV infection (as a model alphavirus) and monitored the effect of DUB depletion on cell viability after infection. We identified a group of DUBs that have a pro-viral effect. The DUB, USP5, from this screen was validated to determine its effect upon viral replication. Here, we show that depleted USP5 in HeLa cells resulted in SFV RNA and viral yield at 8 h post-infection being significantly reduced. In the multi-step viral growth curve assay, in the absence of USP5, similar yields of SFV were determined at 2 and 4 h post-infection. However, a significant reduction in the infectious viral particles release at 6, 8, 10 and 12 h post-infection was observed and this could be reversed by direct constraining viral replication. These results raise the potential for USP5 to play a distinct role in the replication of SFV, suggesting that USP5 may be a possible anti-viral therapy for alphavirus infection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Formal-semantic metaphor in print advertising design
...Show More Authors

The research problem lay in the existing of this direct relation between the increasing and the big variety of the goods and the producing companies which mean the increase of the competition and the directing techniques of the commercial advertisings, which become spread everywhere and in an age characterized with the great varieties in the tests and the stances which requires the designers to seek designing accomplishments that are characterized with creativeness , seriousness and unsallity through the designer depending in constructing his / her texts and his/ her visual items on reference forms metaphors to achieve his / her designing purposes.
So the researcher through her primary flying study seek the identifying the manner of

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 27 2025
Journal Name
Al-salam Journal For Medical Science
Nanotechnology in Molecular Genetics: A literature review
...Show More Authors

Nanotechnology extends the limits of molecular diagnostics to the nanoscale. This study describes some of the details of how the body interacts with nanoparticles. Biological tests measuring the presence or activity of selected substances become quicker, more sensitive, and more flexible when certain nanoscale particles are put to work as tags. Particular emphasis is placed on the effects of surface changes on body-borne particles, their transport within the body, and the dose-response effect. Other considerations include the definition of "persistent" in the context of therapy, FDA scientific committees, and the need for nanoparticle tracking. In short, there have been dramatic changes in molecular and genetic research findings, as well as

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Autoantibody Profile in Systemic Lupus Erythematosus Patients
...Show More Authors
Abstract<p>Systemic lupus erythematosus (SLE) is an autoimmune disease, in which the etiology is not well-understood; however, interactions between environmental and genetic factors in predisposed individuals have been recognized. As a consequence, immunological alternations occur and immune cells are involved, especially T and B lymphocytes that are activated to produce different immune components. Among these components are autoantibodies that react with self-antigens aside from non-self-antigens due to the proposed theory of molecular mimicry. Accordingly, the current study was designed to examine the profile of different autoantibodies in SLE patients by using the indirect membrane based enzyme immunoassay </p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 17 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
Line and continuum variability in active galaxies
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Sep 11 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Application of Nanotechnology in Iraqi Construction Projects
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Sep 19 2019
Journal Name
Engineering, Construction And Architectural Management
Influential safety technology adoption predictors in construction
...Show More Authors
Purpose

Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.

Design/methodology/approach

In total, 26 key technology adoption predictors

... Show More
View Publication
Scopus (61)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Peace Indicating Words in Pre- Islamic Poetry
...Show More Authors

In pre- Islamic poetry, there are a lot of words that indicate
peacefulness of one sort of another, in addition to the inspirations of semantic
modeling in which the poet sets himself in various horizons.
Among these words: brother, comrade, friend, companion, lover,
people, prince, home, land, country, blessing, honesty, contract, company,
justice, thankfulness, forgiveness, pardoning, guest, goodness, faithfulness,
silence, death, peace,….
In addition, there are their derivatives from various aspects that indicate
peacefulness either directly or indirectly.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
The Tohoku Journal Of Experimental Medicine
Neonatal Seizures in Iraq: Cause and Outcome
...Show More Authors

View Publication
Scopus (17)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2009
Journal Name
2009 Ieee Wireless Communications And Networking Conference
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref