Despite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we described the trend in SARS-CoV-2 viral shedding and susceptibility, providing perspectives on gender differences and asymptomatic patients. We further discussed how genetics, gender, viral inoculum, and pre-existing immunity may influence asymptomatic presentations in COVID-19 infections. We hope that this article improves our understanding of asymptomatic SAR-CoV-2 infection and it sheds light on some salient areas that should be considered as the search for a potent vaccine continues.
On-site pit is the most common option that may be used to dispose drilling wastes. The contents of these pits vary, depending on the lithology of formations drilled and the drilling mud ,and different chemical additives.
Eighty samples of mud (sludge) and eighty samples of water have been collected from ten pits of two Iraqi oilfields(North Rumaila and South Rumaila/southern Iraq) and were chemically analyzed for metals Cr, Pb,As, Zn, Fe, Mn,K , Na,Ba, Ca, Mg,SO4=,and Cl- in order to determine the quality and quantity content of studied reserve pits
Inefficient equipment, using toxic materials for various drilling processes, absence of regulations for the design and monitoring of pit during and after drilling operation, and leaking
The synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib
... Show MoreAntimony (Sb) films are fabricated by depositing (Sb) on glass substrates at room
temperature by the method of vacuum evaporation with thickness (0.25 and 0.51m),
with rate of deposition equal to (2.77Å/sec), the two samples are annealed in a
vacuum for one hour at 473K. The optical constants which are represented by the
refractive index (n), extinction coefficient (k) were determined from transmittance
spectram in the near Infrared(2500-3500 )nm regions. The tests have been shown
that the optical energy gap increases with increasing of annealing temperature for
the two samples.
The research aims to study strategic training and its impact on improving the performance of the inspectors general offices in Iraqi ministries, through two variables strategic training Which include Four Dimensions ( Strategic analysis , Formulation of Training Strategy , Implement the Training Strategy , Evaluation ) and Performance included Three dimensions ( Efficiency , Effectiveness , Added-Value).
This research problem is that the Offices of Inspectors rely on pre-made training Programs received from training centers without designing the training programs that provide the employees with the skills and abilities that lead to the implementation of the current and future goals of the orga
... Show MoreA field trial was conducted in Experimental Station of The Field Crops Department – College Of Agriculture In Abu Ghraib, University of Baghdad to assess the effect of sulphur applications and the time after application on pH and EC of soil sample solutions ,and on the growth and yield of rape seed (Brassica napus L.)A split plot design was used with four replications , The main plot included four sulphur applications levels (0,2000,3000,4000Kg S/ha) the sub plot were the time after application (0,1,2,and 3 moths) .Sulphur application significantly decreased soil pH value ,although that decrease reached minimum parameter after two months from application date .Rather increment of sulphur application level significantly raised soil EC val
... Show MoreThe method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search the comparison between binary lo
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbrus precatorius L. is an important medicinal plant belonging to family Fabaceae. The present study was conducted to perform pre-clinical safety evaluation and study the pharmacological effects of the ethanolic seeds extract of A. precatorius in management of pain, psychiatric and neurological conditions. Acute toxicity was performed to study the general behavioural pattern of mice after treatment with the test extract (single doses of 1000, 2000, 3000,4000,5000 mg/kg, body weight) and sub-acute toxicity studies were performed to study the toxic effects of the test extract (1000,2000,3000 mg/kg, per os for 14 days) on different haematological parameters, body and organ weight and histopathology of liver and kidney. The toxicological evalua
... Show More