Aim: To find any association between specific ABO blood groups and FUT2 secretory status and COVID-19 in a sample of Iraqi dentists. Materials and Methods: For each participant, a questionnaire including demography, COVID-19 status, blood grouping, and RH factor, with chemo-sensitive symptoms was recorded. The saliva samples were collected and DNA was extracted from leukocytes. Sequencing of molecular detection of the FUT2 gene by real-time PCR and the data was done, whilst drawing the phylogenetic tree. Results: Out of 133, most of the dentists were female 61%, most were just under 35 years of age. The most participants in this study were predominantly with blood group O (40%), followed by B, A, and AB, with (90%) of them were RH+. All blood grouping and RH factor were high significantly associated with COVID-19 infection and its frequency (p<0.001). A significant association between smell dysfunction and infected blood group A and RH+ (p =0.044, 0.038) while taste dysfunction was negatively and significantly correlated with AB group (r=-0.73; p=0.008). The FUT2 secretor showed a significant association with COVID-19 infection and frequency. The majority of COVID-19-infected participants experienced a significant loss of both smell and taste with fast recovery within 2 weeks. Conclusions: The COVID-19 infection susceptibility and reinfection are associated with FUT2 secretory status and greatly associated to olfactory and gustatory sense loss.
Non Uniform Illumination biological image often leads to diminish structures and inhomogeneous intensities of the image. Algorithm has been proposed using Morphological Operations different types of structuring elements including (dick, line, square and ball) with the same parameters of (15).To correct the non-uniform illumination and enhancement biological images, the non-uniform background illumination have been removed from image, using (contrast adjustment, histogram equalization and adaptive histogram equalization). The used basic approach to extract the statistical features values from gray level of co-occurrence matrices (GLCM) can show the typical values for features content of biological images that can be in form of shape or sp
... Show MoreThis study involves the design of 24 mixtures of fiber reinforced magnetic reactive powder concrete containing nano Silica. Tap water has been used in mixing 12 of these mixtures, while the other 12 have been mixed using magnetic water. Nano Silica (NS) with ratios (1, 1.5, 2, 2.5 and 3) % were used. The results showed that the mixture containing 2.5%NS gives the highest compressive strength at age 7 days. Many different other tests were carried out, the results showed that the fiber reinforced magnetic reactive powder concrete containing 2.5% NS (FRMRPCCNS) has the higher bulk density, dynamic modulus of elasticity, ultrasonic pulse velocity electrical resistivity and lesser absorption than fiber reinforced
... Show MoreA non-polynomial spline (NPS) is an approximation method that relies on the triangular and polynomial parts, so the method has infinite derivatives of the triangular part of the NPS to compensate for the loss of smoothness inherited by the polynomial. In this paper, we propose polynomial-free linear and quadratic spline types to solve fuzzy Volterra integral equations (FVIE) of the 2nd kind with the weakly singular kernel (FVIEWSK) and Abel's type kernel. The linear type algorithm gives four parameters to form a linear spline. In comparison, the quadratic type algorithm gives five parameters to create a quadratic spline, which is more of a credit for the exact solution. These algorithms process kernel singularities with a simple techniqu
... Show MoreDue to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es
Implementing smart community engagement should consider careful planning and collaboration with numerous stakeholders, including the community. The technology and program must be designed to frame its purpose and should link back to specific goals of implementing smart community engagement. Digital services do not guarantee a smart engagement between the community and the local government. This is the case for the Kubang Pasu local government where several online services have been provided in their attempt to implement the smart community concept. However, understanding on the preferences of features and requirements of existing web-based systems and the impact of these systems is lacking. Therefore, a perception study needs to be condu
... Show More
Student dropout is a problem for both students and universities. However, in the crises that Lebanon is going through, it is becoming a serious financial problem for Lebanese private universities. To try to minimize it, it must be predicted in order to implement the appropriate actions. In this paper, a method to build the appropriate prediction system is presented. First, it generates a data source of predictor variables from student dataset collected from a faculty of economic sciences in Beirut between 2010 and 2020. Then, it will build a prediction model using data classification techniques based on identified predictor variables and validate it. Using open-source software and free cloud environments, a prediction program w
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThis paper presents an analysis solution for systems of partial differential equations using a new modification of the decomposition method to overcome the computational difficulties. Convergence of series solution was discussed with two illustrated examples, and the method showed a high-precision, being a fast approach to solve the non-linear system of PDEs with initial conditions. There is no need to convert the nonlinear terms into the linear ones due to the Adomian polynomials. The method does not require any discretization or assumption for a small parameter to be present in the problem. The steps of the suggested method are easily implemented, with high accuracy and rapid convergence to the exact solution,
... Show MoreThis paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.
Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.
Project management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show More