Over the past decades, several studies have examined the subcellular localization of the cauliflower mosaic virus (CaMV) P6 protein by tagging it with GFP (P6-GFP). These investigations have been essential in the development of models for inclusion body formation, nuclear transport, and microfilament-associated intracellular movement of P6 inclusion bodies for delivery of virions to plasmodesmata. Although it was shown early on that the translational transactivation function of P6-GFP was comparable to wild type P6, it has not been possible to incorporate a P6-GFP gene into an infectious clone of CaMV. Consequently, it has not been possible to formally prove that a P6-GFP fusion is comparable in function to the unmodified P6 protein. Here we show that transient expression of P6-GFP can complement a defective CaMV replicon through gene expression, replication and encapsidation, which validates the relevance of P6-GFP subcellular localization studies for understanding the development of CaMV infections.
The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreDrawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show More