Blood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w
... Show MoreThis study aimed to identify the role of digital transformation in improving the quality of the internal audit process. The researchers used the descriptive analytical approach, and the questionnaire was relied on as a study tool that was applied to the study population consisting of internal auditors working in banks listed on the Palestine Stock Exchange, and their number was (85). A checker and a comprehensive inventory method was used due to the small size of the community, where the response data of the questionnaire was analyzed and interpreted using the Statistical Packages Program (SPSS).
The results of the study showed that the use of digital transformation contributes to ensuring the quality of
... Show MoreFusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show MoreIn study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThis research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of
Eat this research study features Technical Ceramics Islamic and Chinese The study of four chapters , such as the first chapter the general framework for research and containing the problem that put the following question: Mamdy effect features art on porcelain Islamic and Chinese ) , and whether there are dimensions of the aesthetic , intellectual and ideological in porcelain Islamic and Chinese with lies the importance of research in the promise of a qualitative study and add a scientific theme features art in porcelain Islamic and China , and the objectives of this study One was in the detection of features technical Ceramics Islamic and Chinese study examined the length of time the ninth century AD , and the tenth century AD , and in
... Show MoreThis research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show MoreThe city of Derna has distinctive architectural and architectural features, like other Arab and Islamic cities in the Arab West and North Africa. Its markets and shops have taken many different forms and structural forms within the urban fabric of the central commercial zone. The meeting between the various commercial and handicraft jobs and consumers within a spatial area starting with the old markets of the dark market and the agency of the harvest and vegetable market and the mosque of the old and the square of the mosque and the Red Square and the square Kharazin. It then grew linearly towards commercial hubs that were associated with the city's expansion axes. Old markets represent the architectural and planning heritage associated
... Show More