In this study negative result of real-time reverse transcription-QPCR (RT-PCR) assay
tests of Influenza virus of nasal screetion and throat swap samples of Iraqi patients
hospitalized with signs and symptoms of an upper respiratory tract infection in Central
Republic Health Laboratory in Iraq were tested for Respiratory Syncytial Virus
infection by RT PCR .Positive samples was 4 out 0f 20 were used .Viral isolation was
done on a monolayer of 70-80% confluent Human Lung Carcinoma Cells (A549) cell
line and incubated at 33ºC for 4 days .Syncytia was observed in 3 positive samples.
Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D
... Show MoreBackground: Sperm motility disorder is an important cause of infertility in male, and one of the causes of reduced motility of the sperm is the disorders of the mitochondria because it provides the required energy for sperm motility, Laser biostimulation or low-level laser therapy has a positive effect on the mitochondria and led to increasing the synthesis of ATP. Method: Twenty fresh human semen samples were used in this research study, each sample was separated into two portions, one was used as control which is not exposed to the laser beam and the other was irradiated with the wavelength of 410 nm diode laser with an output power of 100 mW and an exposure time of 60 seconds, then the measurement of
... Show MoreIn the course of generating a library of open-chain epothilones, we discovered a new class of small molecule anticancer agents that has no effect on tubulin but instead kills selected cancer cell lines by harnessing reactive oxygen species in an iron-dependent manner.
Some maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.
Copper with different concentrations doped with zinc oxide nanoparticles were prepared from a mixture of zinc acetate and copper acetate with sodium hydroxide in aqueous solution. The structure of the prepared samples was done by X-ray diffraction, atomic force microscopy (AFM) and UV-VIS absorption spectrophotometer. Debye-Scherer formula was used to calculate the size of the prepared samples. The band gap of the nanoparticle ZnO was determined by using UV-VIS optical spectroscopy.
Education is considered the corner stone of all nations development. It is the principal way for the development of human sources and the most achievements of the age due to the knowledge of these resources .
As its active role which accounting departments implement in Iraq universities , (public and private) through their teaching programs , they aim to supply labour-market with qualified cadre graduated as accountants auditors , tax auditors , financial analysts , ac
... Show MoreInformation centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show More