The dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthorized searches by those involved. In addition to securing inquiries, making calculations on this data, and generating differential privacy and garbled circuits, cryptography is considered one of the important solutions to this problem. This paper introduces most of the important challenges related to maintaining privacy and security and classifies each problem with appropriate, proposed, or applied solutions that will fuel researchers' future interest in developing more effective privacy-preserving methods for genomic data.
Acute Respiratory Distress Syndrome (ARDS) causes up to 40% mortality in humans and is difficult to treat. ARDS is also one of the major triggers of mortality associated with coronavirus-induced disease (COVID-19). We used a mouse model of ARDS induced by Staphylococcal enterotoxin B (SEB), which triggers 100% mortality, to investigate the mechanisms through which Δ9-tetrahydrocannabinol (THC) attenuates ARDS. SEB was used to trigger ARDS in C3H mice. These mice were treated with THC and analyzed for survival, ARDS, cytokine storm, and metabolome. Additionally, cells isolated from the lungs were used to perform single-cell RNA sequencing and transcriptome analysis. A database analysis of human COVID-19 patients was also performed t
... Show MoreRuthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated
... Show MoreIn the current work, the mixing ratios ( 𝛿 ) of gamma transitions were calculated from energy levels in the isotopes neodymium 60𝑁𝑎 142−150 populated in the 60Nd 142− 150 (n, n ˊγ) 60Nd 142− 150 using the 𝑎2 ratio method. We used the experimental coefficient (𝑎2 ) for two γ-transitions from the initial state itself, the statistical tensor 𝜌2(𝐽𝑖), associated with factor 𝑎2 , would be the same for the two transitions. The results obtained are in good agreement or within the experimental error with -those previously published. And existing contradictions resulting from inaccuracies in the empirical results of previous work. The current results confirm that the , 𝑎2 − method is used to calculate th
... Show MoreThis research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha
... Show MoreThe present study provides a new insight into valuable information on the diverse structure of the Anisakid population and discusses the limited species richness in the Nemipterus japonicus (Bloch,1791) (Perciformes, Nemiperidae). The fishing area consists of various locations in the Arabian Gulf (29°58 0 33 00 N48°28 0 20 E). A total of 315 marine fish were examined, (n=287) were infected. Larval stages (n= 763) encysted within the mesenteries peritoneum and viscera of fish organs were isolated, with a prevalence of 91.11% of infection and, the intensity was 2.65. Molecular analysis was carried out on thirty individuals who have examined the morphology and showed some appearance differences, by amplifying internal transcribed spacers
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThis research paper which is entitled “Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky” deals with the forms of verbs (i.e., kinds of tenses and suffix analysis). It is one of the applied studies. Verbs are basic elements in Turkish sentences. Their function is to state the predicate which is a sentential essential part. Verbs denote sentence construction, action and formal aspects. Forms are added to the base of verbs in the Turkish language giving the verbs their final structures. Such structures are set in a distinct planned way. The verbs used in the Turkish language which are distinguished by one of these forms are known as simple tense verbs.
Sait Faik'in ( "Havada Bulut" adlı Hikayesinde Fi
... Show MoreThe research aims to monitor the methods of Counter psychological warfare in the Iraqi press during the operations to liberate Mosul from the control of the terrorist organization ISIS.The research used the survey method, and “Tareek Al Shaab” Newspaper as a research sample, chosen according to the systematic random sample.
The research reached the following results:
1- The Communicator’s relied on the contents of the counter-psychological warfare and its methods in the battle of “Qadimun Ya Naynawa” used in the newspaper. The methods used were labels assigning such as : inevitable victory, prodding and morale, consensus, breaking of opposition morale, stereotyping, demonization of the opponent
The Organizational Transparency is regarded one of the effective means in the attempts of the restoration and working to prevent the corruption and reduce the negative managerial economic social and political effects.
Accordingly, this study aims at importance of performing an explorative analytical study in order to stand on the effect of the Organizational Transparency in the reduction of environment of Iraqi Organizations.
To achieve this study, three hypotheses were chosen; the first is the correlation relation and the second is the effect and the third is the differences, and statistical means represented by correlation coefficient "Spearman", "", "Mann- Whit
... Show More