Preferred Language
Articles
/
Kxe-uZEBVTCNdQwCh5kV
SARS-CoV-2 viral shedding and susceptibility: perspectives on gender and asymptomatic patients
...Show More Authors

Despite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we described the trend in SARS-CoV-2 viral shedding and susceptibility, providing perspectives on gender differences and asymptomatic patients. We further discussed how genetics, gender, viral inoculum, and pre-existing immunity may influence asymptomatic presentations in COVID-19 infections. We hope that this article improves our understanding of asymptomatic SAR-CoV-2 infection and it sheds light on some salient areas that should be considered as the search for a potent vaccine continues.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Impact of Neutron Sources of Stellar Reactions on Fluorine Abundances
...Show More Authors

       There are many neutron sources in the universe that play an important role in the stellar slow neutron capture (s-process) nucleosynthesis. Fluorine-19 is a cosmically rare isotope that is generated in a series of reactions. The aim in this paper is to perform theoretical calculations to test the variance of neutron intensity generated within stellar conditions, especially in Asymptotic Giant Branch (AGB) stars, on the production of 19F isotope. EMPIRE II program has been utilized with the aid of many Matlab programs, and experimental comparisons have been made with NACRE II and Reaclib libraries. The results has shown that the high abundances of reactant nuclei responsible for ultimately generating

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue May 05 2020
Journal Name
Book
Study the inhibitory effect of miswak extract on biofilm gene.
...Show More Authors

This book presents the problem of tooth decay due to bacteria Streptococcus mutans one of methods of treatment using 3 extracts of S. persica (miswak) (aqueous, acetone and methanol) and prove its effectiveness and its impact on the gtf (B, C, and D) genes that code the glucosyltransferase (Gtf) enzymes that cause decay membrane compared to the usual means used for the prevention of tooth decay

Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Pistachio Husks Powder Additive on Unsaturated Polyester Composites
...Show More Authors

In this study, polyester composites reinforced with pistachio shells powder (P.) with an average
diameter (150 – 200 μm) with different weight ratios (0.5%, 1%, 1.5%, 2%, and 2.5%) were
prepared to the resin. The Shore D hardness, thermal conductivity (K), and the glass transition
temperature (Tg) of the samples were examined. The results showed that the Shore D hardness
increases with the increase of the reinforcement ratio and its maximum value is (87.55) at (2.5%
P.) While the value of hardness at (0%) is (86.5). The thermal conductivity increases slightly with
the increase in the percentage of reinforcement and its maximum value is (0.213253 W/ m. K) at
(2.5% P.), while the value of K at (0% P.)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Agricultural Sciences
Response of different cucumber hybrids to grafting on squash rootstock
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Aug 15 2023
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte
The Impact Of Corporate Governance Mechanisms On Tax Avoidance Practices
...Show More Authors

This research came with the aim of showing the impact of governance mechanisms on tax avoidance practices, and in light of this, the financial data of the joint stock companies (industrial, service, agricultural, and hotels) listed in the Iraq Stock Exchange amounting to (35) companies were collected during the period (2009-2020). Through the financial reports published on the market website, multiple linear regression analysis was used as a tool to study the relationship between variables, and (Eviews 12) program was used for analysis and hypothesis testing. To achieve the objectives of the research,(administrative ownership, board size, board independence, women's membership) was adopted as an indicator of the dimensions of governance, an

... Show More
Preview PDF
Scopus
Publication Date
Wed Jun 17 2015
Journal Name
جامعة المستنصرية
study of some aspect on Iraqi children with Atopic Dermatitis
...Show More Authors

Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Some Results on the Generalized Cayley Graph of Complete Graphs
...Show More Authors

     . Suppose that  is the Cayley graph whose vertices are all elements of  and two vertices  and  are adjacent if and only if . In this paper,we introduce the generalized Cayley graph denoted by  which is a graph with a vertex set consisting of all column matrices  in which all components are in  and two vertices  and  are adjacent if and only if , where  is a column matrix that each entry is the inverse of the similar entry of  and  is  matrix with all entries in  ,  is the transpose of  and  and m . We aim to provide some basic properties of the new graph and determine the structure of  when  is a complete graph  for every , and n, m  .

View Publication Preview PDF
Scopus Crossref