Preferred Language
Articles
/
9RhkJZcBVTCNdQwCh5W0
Transient expression of cauliflower mosaic virus (CaMV) P6-GFP complements a defective CaMV replicon to facilitate viral gene expression, replication and virion formation
...Show More Authors

Over the past decades, several studies have examined the subcellular localization of the cauliflower mosaic virus (CaMV) P6 protein by tagging it with GFP (P6-GFP). These investigations have been essential in the development of models for inclusion body formation, nuclear transport, and microfilament-associated intracellular movement of P6 inclusion bodies for delivery of virions to plasmodesmata. Although it was shown early on that the translational transactivation function of P6-GFP was comparable to wild type P6, it has not been possible to incorporate a P6-GFP gene into an infectious clone of CaMV. Consequently, it has not been possible to formally prove that a P6-GFP fusion is comparable in function to the unmodified P6 protein. Here we show that transient expression of P6-GFP can complement a defective CaMV replicon through gene expression, replication and encapsidation, which validates the relevance of P6-GFP subcellular localization studies for understanding the development of CaMV infections.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
The distance variation due to mass transfer and mass loss in (13.6+8) Mand (13+10) M binary star systems
...Show More Authors

In this research the change in the distance of the two stars in two binary star systems (13.6+8)M8and (13+10)Mwas studied, through the calculations the value  (rate of mass transfer) of the two phases of dynamical stages of mass which are mass loss and mass transfer has been extracted in its own way ,by extracting the value of  the value of (the distance variation between the two stars) has been found only in the mass transfer stage by using mathematical model ,in mass loss stage  and   were calculated from the change and the difference between the values of each at different times of binary star system evolution ,it was found that  the maximum values of  and  are in ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of The Faculty Of Languages
A Psychological Reading of The Problem of the Black in John Steinbeck’s Of Mice and Men
...Show More Authors

Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
A Psychological Reading of The Problem of the Black in John Steinbeck’s Of (Mice and Men)
...Show More Authors

The present paper applies Fanon Psychological reading of the problem of the Black introduced in his book Black Skin White Mask to Crooks, The black Character in John Steinbeck’s  Of Mice and Men. The analysis of this character infers three essential points regarding the artistic achievement of the author. First, he uses a fictional character that offers a psychological interpretation of the black problem of alienation and loneliness in a way that does not disgrace the black. Second, he applies Fanon’s way of showing the various attitudes that the black adopts in contact with the white society. Third, he affirms that the black inferiority complex comes as a result of double proc

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Interlanguage Pragmatics of Non-Institutional Criticism: A Study of Native and Non-Native Speakers of English
...Show More Authors

Criticism is inherently impolite and a face-threatening act generally leading to conflicts among interlocutors. It is equally challenging for both native and non-native speakers, and needs pre-planning before performing it. The current research examines the production of non-institutional criticism by Iraqi EFL university learners and American native speakers. More specifically, it explores to what extent Iraqi EFL learners and American native speakers vary in (i) performing criticism, (ii) mitigating criticism, and (iii) their pragmatic choices according to the contextual variables of power and distance. To collect data, a discourse-completion task was used to elicit written data from 20 Iraqi EFL learners and 20 American native speaker

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
The husband's right to discipline his wife
...Show More Authors

The husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values ​​and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonme

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Target cost tool to achieve competitive advantage
...Show More Authors

Target costing is one of the modern techniques in strategic Management accounting, Is has shown active adoption to changes in current business environments, In addition, is has seen a growth in strategic approach, The goal of using target costing is to build and strengthen competition abilities of economic units through introducing appropriate ways to decrease cost values while maintaining and improving quality of product, So this study is aim to show how can  economic units use target costing to achieve competitive advantages .

 

View Publication Preview PDF
Crossref