By March 2020, a pandemic had been emerged Corona Virus Infection in 2019 (COVID-19), which was triggered through the sensitive pulmonary syndrome (SARS disease corona virus- 2 (SARS COV-2). Overall precise path physiology of SARS COV-2 still unknown, as does the involvement of every element of the acute or adaptable immunity systems. Additionally, evidence from additional corona virus groups, including SARS COV as well as the Middle East pulmonary disease, besides that, fresh discoveries might help researchers fully comprehend SARS CoV-2. Toll-like receptors (TLRs) serve a critical part in both detection of viral particles as well as the stimulation of the body's immune response. When TLR systems are activated, pro-inflammatory cytokines like interleukin 1 (IL1), IL6, or nuclear factors, in addition to helpful interferon, are secreted. TLRs such as TLR2, TLR3, TLR4, TLR6, TLR7, TLR8, or TLR9 might possibly have a role in COVID-19 infections. It's also important noting that while dealing with COVID-19 infections, researchers should consider both the good or detrimental impacts of TLR. TLRs might be a focus for reducing infections inside the initial phases of the illness or developing a SARS CoV-2 vaccine.
Abstract
The research aims to measure family negligence and its relationship with internet addiction among university students. The researcher has developed a scale of (20) items to measure the negligence of family, which was applied to (308) male and female university students in the first and fourth stages. The research concluded that University students suffer from family negligence. The research sample has an addiction to the Internet. There is a relationship between family neglect and addiction to the Internet among university students. The researcher came out with a number of suggestions and recommendations.
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreBackground: Most primary hypothyroidism patients also experience inefficiency and irregularity. It is possible to understand the significance of myo-inositol in treating the thyroid gland by relating it to the synthesis of thyroid hormones. Study aimed to estimate serum of inositol 1,4,5-triphosphate (IP3) in primary hypothyroidism disorder and through that level it can shed light on whether it is accused of inactivity of the thyroid gland and at the same time open the doors for the use as a treatment.
Subject and Methods: The study was taken from the analytical cross-sectional design.120 subjects were divided into three groups, the first group included 40 healthy subjects, the s
... Show MoreBackground :The incidence of bile ducts injuries( BDI )has risen from) 0.1 to 0.2%( to) 0.4 to 0.6% ( between the era of open cholecystectomy( O C) and the age of laoaroscopic cholycystectomy( LC.) The aim of the study is to review the management and surgical outcome of the bile duct injuries in gastroenterology and hepatology teaching hospital .Methods: This study is Prospective, done in G.I.T hospital ,From January 2008 –to –February 2011, patients included in this study had prevouse history of cholecystectomy which followed by sign and symptoms of bile duct injures .Most patients have been reffered from other hospitals,supprting therapy were given to them and investigations performed to evaluate the the type of injureis ,minor inj
... Show MoreAbstract
The current research aims to identify the role of family upbringing methods in shaping adolescent gender identity disorder, to identify the causes, components, and disorders of the gender identity of adolescents, and to develop practical visions and suggestions to reduce and stop gender identity disorder completely. Due to the sensitivity of the topic, a questionnaire of five open-ended questions was posted on Facebook to collect the needed data, where (20) respondents answered these questions. The researcher took these (20) respondents as the study sample. The results revealed that excessive emancipation within the family, failure to employ family protection laws, and failure to monitor and follow up on
... Show MoreThank God also taught us that thanks . thank meets the blessings and rewards mazidk glory we have no knowledge except what you have taught you Alim hakim , not counted praise you as yourself praised and pray and to recognize the envoy mercy to the worlds , prophet Mohammed and his family and companions and guided to the day of judgment .
But after :
Aware of the interpretation of the most important science needed by Muslims because God Almighty sent down the Quraan to be a way of the life for Muslims is subject to a healing for what is in the breasts and it slaham and flaham and has spared the nation from crisisThe stats of the monks , like other verses talking about Christians and Jews and what they have invented in the religion o
Most of the theorists and researchers and also those interested in cinema and television attributed the fact of the existence of the dramatic works to the directors may be due to a historical justification. At the same time, the existence of the production world came as a result of the emergence of the production city (Hollywood). This is also a historic fact. The research would tackle all the formative truths to prove the relation and the timeline, i.e., before and after and the synergy that resulted in the existence of the dramatic works that benefited the humanity and those interested in this giving art. The objective of the research is to uncover the formative truth of the dramatic work between direction and production.
The s
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More