Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of blood donations. In this study, genotypes (A, B, C and D) were detected, largely associated with blood donors residences and distributed to areas of Iraq through a map. Genotype A comprised 28 (34.6%) of blood donors and for genotype C it was 16 (19.8%) and both genotypes were found to be the predominant genotypes, followed by genotype B of 7 (8.7%) and D of 2 (2.5%), the latter is included into Mixed genotypes of 8 (9.9%), whereas, 22 (27.2%) were undetermined genotypes. Efforts should focus on these findings, which may indicate that Iraq is an endemic region of HHV-8 infection.
Jurisprudence of Imam women through Susan Book of blood money
Diversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a
... Show MoreThis study examined the effect of elements of internal marketing activities on customer satisfaction through an exploratory study of banking services in the city of Baghdad, if the research problem crystallized by asking a group of questions, the most important (is there a correlation and impact between the dimensions of internal marketing and customer satisfaction, this study aims to determine The effect of internal communication, training and internal market research on customer satisfaction, represented by the quality of service, loyalty and market share, and embodied the objective of this study to identify the level of availability of internal marketing activities and programs in the research banks, data were collected using
... Show MoreAcute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro
... Show MoreThe Incentives legislation aims to raise the efficiency of job performance of all kinds through optimal investment of human resources and their capabilities to raise or increase and production influence and provide distinguished and creative services such as The Incentives Law of Productive Ministries Employees No. 20 of 1993 and instructions issued by ministries and relevant Facilities regarding incentives for their affiliates based on provisions Public Companies Law and the instructions of the Higher Education Fund issued by the Ministry of Higher Education and Scientific Research. The human element is the most unstable and complex element of production as it is characterized by a set of feelings and emotions that is expresses
... Show MoreDue to the urgent need to develop technologies for continuous glucose monitoring in diabetes individuals, poten tial research has been applied by invoking the microwave tech niques. Therefore, this work presents a novel technique based on a single port microwave circuit, antenna structure, based on Metamaterial (MTM) transmission line defected patch for sensing the blood glucose level in noninvasive process. For that, the proposed antenna is invoked to measure the blood glu cose through the field leakages penetrated to the human blood through the skin. The proposed sensor is constructed from a closed loop connected to an interdigital capacitor to magnify the electric field fringing at the patch center. The proposed an tenna sensor i
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More