Since the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan city-SARS-CoV-2 is very similar to two types of bats Coronavirus in RdRp nucleotide sequence to RdRp of SARS-CoV-2 suggesting possible transmission from bats. Moreover, many genomic mutations are found in SARS-CoV-2 genomes suggesting the mutations are developed and the virus is constantly changed. The newly discovered SARS-CoV-2 has a new open reading frame (ORF) that encodes for thirty-eight amino acid peptide chains and has no similar sequence in all reported NCBI data regarding respiratory viruses. The short peptide can serve as an identification target for SARS-CoV-2 detection.
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show Moreالمستخلص [English] Peace-building is a science that has its foundations and needs mechanisms, components, studies and plans based on the needs of the parties responsible for achieving peace and meeting the necessary needs of conflict societies, as it has become a goal sought by many local and regional actors and parties. The State of South Africa has realized this fact and has devoted space in its conception and planning to addressing the issues of conflict and war within the framework of its unitary work.Since security and stability in general seek to create peaceful and legal means through which existing problems can be expressed and addressed. The differences have varied to build peace and create cooperation between groups and th
... Show MoreThe paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show MoreThe Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show MoreObjective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth
... Show MoreObjective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth surf
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show More