Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of b
... Show MoreAromatic hydrocarbons present in Iraqi national surface water were believed to be raised principally from combustion of various petroleum products, industrial processes and transport output and their precipitation on surface water.
Polycyclic aromatic hydrocarbons (PAHs) were included in the priority pollutant list due to their toxic and carcinogenic nature. The concern about water contamination and the consequent human exposure have encouraged the development of new methods for
PAHs detection and removal.
PAHs, the real contaminants of petroleum matter, were detected in selected sites along Tigris River within Baghdad City in summer and winter time, using Shimadzu high performance liquid chromatography (HPLC) system.
Analysi
The association of phytoplasma was investigated in symptomatic tomato (
This study aims to know the role of strategic leadership to achieving competitiveness in industrial establishments by identifying the respondents’ perceptions about the level of availability of dimensions of leadership strategies (creativity and innovation, risk tolerance, available opportunities) in Bashir Al-Siksek & Partners Company for the manufacture of sanitary and plastic ware in Gaza strip
To achieve this, a questionnaire was developed and distributed to a sample of managers, auditors, accountants, and administrative employees in the study sample company. The questionnaire tool was distributed to 60 employees and employees, of which (52) were retrieved, or 86.6%, and (8) were excluded for la
... Show MoreIn the city of Hebron, small business industrial organizations face a major challenge related to its ability to reach, attract and sustain a sufficient number of customers in order to ensure its continuity and sustainability. The research problem is summarized in an attempt to reveal how the e-marketing could improve and support the marketing effectiveness of small business industrial organizations in the city of Hebron/Palestine. The importance of this research stems from the fact that it addresses a new knowledge branch of the field of marketing, which is electronic marketing for small business organizations, and the fact that the research highlights appropriate marketing solutions for these organizations in light of the Intern
... Show MoreGranular Pile Anchor (GPA) is one of the innovative foundation techniques, devised for mitigating heave of footing resulting from the expansive soils. This research attempts to study the heave behavior of (GPA-Foundation System) in expansive soil. Laboratory tests have been conducted on an experimental model in addition to a series of numerical modeling and analysis using the finite element package PLAXIS software. The effects of different parameters, such as (GPA) length (L) and diameter (D), footing diameter (B), expansive clay layer thickness (H) and presence of non-expansive clay are studied. The results proved the efficiency of (GPA) in reducing the heave of exp
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the