Record, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
The research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a
... Show MoreUtilizing phase change materials in thermal energy storage systems is commonly considered as an alternative solution for the effective use of energy. This study presents numerical simulations of the charging process for a multitube latent heat thermal energy storage system. A thermal energy storage model, consisting of five tubes of heat transfer fluids, was investigated using Rubitherm phase change material (RT35) as the. The locations of the tubes were optimized by applying the Taguchi method. The thermal behavior of the unit was evaluated by considering the liquid fraction graphs, streamlines, and isotherm contours. The numerical model was first verified compared with existed experimental data from the literature. The outcomes re
... Show MoreTo follow up the response of acute lymphoblastic leukemic
(ALL) patients to chemotherapy treatment and for prognosis, diagnosis, the total Sialic acid (TSA) levels was studied as a tumor marker. The study included 40 patients (male = 22, female =18) with (ALL) were tested for the serum and leukocytes homogenate concentrations of total sialic acid (TSA) before and after treatment with six different chemotherapy protocols. &n
... Show MoreSimulation of free convection heat transfer in a square enclosure induced by heated thin plate is represented numerically. All the enclosure walls have constant temperature lower than the plate’s temperature. The flow is assumed to be two-dimensional. The discretized equations were solved stream function, vorticity, and energy equations by finite difference method using explicit technique and Successive Over- Relaxation method. The study was performed for different values of Rayleigh number ranging from 103 to 105 for different angle position of heated thin plate(0°, 45°, 90°). Air was chosen as a working fluid (Pr = 0.71). Aspect ratio of center of plate to the parallel left wall A2
... Show MoreMeta-heuristic algorithms have been significantly applied in addressing various real-world prediction problem, including in disease prediction. Having a reliable disease prediction model benefits many parties in providing proper preparation for prevention purposes. Hence, the number of cases can be reduced. In this study, a relatively new meta-heuristic algorithm namely Barnacle Mating Optimizer (BMO) is proposed for short term dengue outbreak prediction. The BMO prediction model is realized over real dengue cases data recorded in weekly frequency from Malaysia. In addition, meteorological data sets were also been employed as input. For evaluation purposes, error analysis relative to Mean Absolute Percentage Error (MAPE), Mean Square Err
... Show MoreThis paper is devoted to the study of the peristaltic transport of viscoelastic non-Newtonian fluids with fractional Maxwell model in an inclined channel. Approximate analytical solutions have been constructed using Adomain decomposition method under the assumption of long wave boundary layer type approximation and low Reynolds number. The effect of each of relaxation time, fractional parameters, Reynolds number, Froude number, inclination of channel and amplitude on the pressure difference, friction force and stream function along one wavelength are received and analyzed.
Chronic inflammation can induce proliferative events and posttranslational DNA modifications in prostate tissues through oxidative stress. The miR-155 expression is abnormally increased in tumors. Therefore, this study aims to explore the clinical significance of serum TNF-α and IL-1α as well as miR-155 expression in prostate cancer (PC) patients.
A total of 50 blood samples from patients diagnosed with prostate cancer were collected from the Oncology Department, Baghdad Teaching Hospital, along with samples from 50 healthy volunteers. Serum TNF-α and IL-1α levels in Iraqi males with prostate cancer were estimated by using enzyme-linked immunosorbent
assay (ELISA). The total RNA was extracted from all subjects and con
... Show MoreThis study was conducted to investigate phytoplasma causing a virescence disease on Arabic jasmine Jasminum sambac based on microscopy and molecular approaches. Samples were collected from symptomatic Arabic jasmine plants grown in nurseries in Baghdad-Iraq. Specimens from infected plants were prepared and Dienes stained for light microscopy examination. Phytoplasma were detected in infected plants by polymerase chain reaction (PCR) using P1/P7 and SecAfor1/SecArev3 Candidatus Phytoplasma specific primer sets. Light microscopy test showed symptomatic Arabic jasmine plants were phytoplasms infected when phloem tissues were stained with a dark blue color. PCR test confirmed the symptomatic plants were phytoplasms infected when SecAfor1/Sec
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More