This study aimed to get a better understanding of molecular epidemiology and genetic variation in the spike glycoprotein as a key viral component involved in viral entrance into host cells and as a potential vaccination target. Three Iraqi SARS-CoV-2 strains were investigated using whole-genome sequencing, with two of them clustering into the 20A (GH) clade, and the remaining strain is clustered in 20E (GV) clade, belonging to the B.1.36.1 and B.1.177.80 lineage, respectively. Whole-genome sequencing of the viral RNA samples revealed nine sporadic nonsynonymous uncommon mutations with frequency ranged from 0.00 to 0.19%. The ORF1ab, ORF1a, ORF3a, S, N, intergenic, ORF7 and ORF8 areas have seen the most changes. Furthermore, in all of our sequences, we discovered a D614G (aspartic acid to glycine) mutation in spike protein that co-occurred with an NSP12 P323L (viral RNA-dependent RNA polymerase) mutation. The findings point to several viral introductions in Iraq and provide new genetic information on SARS-CoV-2 at the worldwide level. Pathogenesis, diagnostics and vaccine development require information such as SNPs and mutations.
Background: Primary healthcare in Egypt has undergone significant reforms since the 1990s, including the pioneering Family Health Program (FHP). However, limited evaluation exists regarding the FHP's impact on enhancing the delivery of primary healthcare services. The primary objective of this study was to analyze and understand the efficiency and effectiveness of the FHP in altering the delivery of primary healthcare in Egypt. We aimed to outline the fundamental characteristics of the primary healthcare system, compare them between the conventional and the newly reformed FHP centers, and gauge the awareness level of these variances among key decision-makers, focusing specifically on Cairo, Egypt. Methods: This cross-sectional study employe
... Show MoreABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine
... Show MoreThis study is a numerical analysis of the transition process from the second to the third mode in transformer oil. In this study, it was determined how to change from the second to the third mode, which is thought to be a precursor to the process of electrical breakdown, which results in a significant loss of electrical energy and harm to electrical devices and equipment. The initiation time, length, rate of propagation velocity, and radius of the streamer discharge were determined. The transition from the second to the third mode during the electrical discharge process may lead to the occurrence of an electrical breakdown, which is one of the greatest challenges facing scientists and engineers who deal with the
... Show MoreLow serum total adiponectin is associated with a high incidence of type 2 diabetes or coronary artery disease in the general population. Paradoxically, serum total adiponectin is elevated in patients with chronic kidney disease (CKD), such as overt diabetic nephropathy. The current study aimed to investigate whether or not anemia to be dependently associated with serum level of total adiponectin in non-albuminuric male patients with type 2 diabetes . The study included 42 type 2 diabetic male patients. Anemia was deï¬ned as hemoglobin (Hb) below 14.0g/dL. All the patients were without microalbuminuria, to exclude diabetic nephropathy. The diabetic patients were divided into 2 groups according to the hemoglobin level in ad
... Show MoreTwelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).
ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va
... Show MoreIn this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the c
... Show MorePassive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay
... Show MoreIn this study, different oil fields in Mesopotamian basin, southern Iraq (Siba, Zubair, Nahr - Umr, Majnoon, Halfaya, Kumait, and Amara) were selected for studying burial history. PetroMod software 1D was used for basin constructing and to evaluate burial history of the basin. Results showed that in the upper Jurassic to the Recent, Mesopotamian Basin exhibited a complex subsidence history over a period of about 152 Ma.There are different periods of subsidence: high, moderate, and slow. High subsidence occurred at upper Jurassic- mid Cretaceous and at Miocene due to Tectonic subsidence. Slow subsidence occurred at upper Cretaceous and moderate subsidence at Paleogene. In the upper Jurassic, rapid subsidence is driven under the effect of
... Show MoreThe aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR.