Preferred Language
Articles
/
uxYT7YoBVTCNdQwCwKh1
Candida Berkh. (1923) Species and Their Important Secreted Aspartyl Proteinases (SAP) Genes Isolated from Diabetic Patients

Candida Berkh. (1923) occurs naturally in the body. But it becomes opportunistic fungi, meaning that it infects humans when there is any weakening of the immune system, such as exposure to chemotherapy, diabetes, or organ transplantation. Most species of Candida grow at a temperature between 20-40 °C and have a pH of 3-8. Human pathogens of Candida species include C. albicans, C. glabrata, C. lusitaniae, C. parapsilosis, C. tropicalis and C. utili. C. albicans has many virulence factors that facilitate injury process. Virulence factors are considered as a measure of pathogenicity, and it is in the form of fungal toxins, enzymes, or cell structures that facilitate infection, as well as pathogen resistance in different conditions. This study aimed to investigate the frequency of some secreted aspartyl proteinases (SAP) genes from some Candida species isolated from diabetic patients

Publication Date
Wed Sep 01 2021
Journal Name
Applications And Applied Mathematics: An International Journal (aam)
Stability and Bifurcation of a Cholera Epidemic Model with Saturated Recovery Rate

In this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.

... Show More
View Publication
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
A Study of Fluctuation and Expansion Ratios for Gas-Solid Fluidized Columns

The fluctuation and expansion ratios have been studied for cylindrical gas-solid fluidized columns by using air as fluidizing medium and Paracetamol as the bed material. The variables were the column diameter (0.0762, 0.15, and 0.18 m), static bed height (0.05, 0.07, and 0.09 m), and air velocity to several times of minimum fluidization velocity. The results showed that both the fluctuation and expansion ratios had a direct relation with air velocity and an inverse one with column diameter and static bed height. A good agreement was between the experimental results and the calculated values by using the correlation equations from the literature.

Crossref
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Delay differential equation of the 2nd order and it's an oscillation yardstick

This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions

Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Lie and Jordan Structure in Prime Γ- rings with Γ-centralizing Derivations

Let M be a prime Γ-ring satisfying abc  abc for all a,b,cM and
,  with center Z, and U be a Lie (Jordan) ideal. A mapping d :M M
is called Γ- centralizing if u d u Z  [ , ( )] for all uU and  .In this paper
, we studied Lie and Jordan ideal in a prime Γ - ring M together with Γ -
centralizing derivations on U.

View Publication Preview PDF
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Authorities and Procedures for Detecting Financial Violations : A Study in French Legislation

France attached great importance to public funds Article 15 of the Declaration on Human and Citizen's Rights (DDHC) stipulates that society has the right to hold any public official accountable for his or her administration. For that reason, the French legislature has established a body specialized in the control of public funds, which it calls the Court of Accounting. It has established the Court of Budget and Financial Discipline to assist it. The courts are run by judges who cannot be dismissed. The courts are also given jurisdiction, administrative jurisdiction and the role and purpose for which they have been assigned

View Publication Preview PDF
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Reconciliation between Immunity Assessed for the Diplomatic Bag and Considered National Security

The diplomatic bag is one of the important means of communication used by the diplomatic mission to communicate with the government of the sending country and its consulates, as well as the missions in other countries. The diplomatic bag was granted absolute immunity against opening, seizing and inspection in order to effectively perform the function entrusted to it. The practical reality revealed the exploitation of the diplomatic bag to smuggle drugs and shipments of weapons and explosives that harmed the national security of the receiving country. The International Law Committee avoided the matter and reconciled the interest of the immunity of the diplomatic bag with the interest of the state in preserving national security and sovere

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Evaluation of Hydrocarbon Saturation Using Carbon Oxygen (CO) Ratio and Sigma Tool

 

The main aim of this study is to evaluate the remaining oil in previously produced zones, locate the water productive zone and look for any bypassed oil behind casing in not previously perforated intervals. Initial water saturation was calculated from digitized open hole logs using a cut-off value of 10% for irreducible water saturation. The integrated analysis of the thermal capture cross section, Sigma and Carbon/oxygen ratio was conducted and summarized under well shut-in and flowing conditions. The logging pass zone run through sandstone Zubair formation at north Rumaila oil field. The zones where both the Sigma and the C/O analysis show high remaining oil saturation simila

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Identity Attributes and Strategies in Industrial Product Design: وليد محمد مهدي عيسى

The research discussed the role of interrelationships between the product attributes and the individual identity of the brand and the user, starting from reviewing the identity concepts in the general design propositions and the identity from the industrial design perspective, and highlighting the role of the attributes in identifying the individual identity of the product, which would enable the user to adopt them to be representative of his identity, starting from identifying the importance of the identity being characterized by three major elements: innovating products in the user's viewpoint, viewing the user's environment, the methodology of the design language, and identifying the identity attributes in the industrial product start

... Show More
Crossref
View Publication Preview PDF