Background: The Epstein-Barr virus (EBV) relates to the torch virus family and is believed to have a substantial impact on mortality and perinatal events, as shown by epidemiological and viral studies. Moreover, there have been documented cases of EBV transmission occurring via the placenta. Nevertheless, the specific location of the EBV infection inside the placenta remains uncertain. Methods: The genomic sequences connected to the latent EBV gene and the levels of lytic EBV gene expression in placental chorionic villous cells are examined in this work. A total of 86 placentas from patients who had miscarriage and 54 placentas from individuals who had successful births were obtained for analysis. Results: The research employed QPCR to dete
... Show MoreCladosporium sp. plays an important role in human health, it is one of the pathogenic fungi which cause allergy and asthma and most frequently isolated from airborne spores. In this study, a couple of universal PCR primers were designed to identify the pathogenic fungi Cladosporium sp. according to conserved region 5.8S, 18S and 28S subunit ribosomal RNA gene in Cladosporium species. In silico RFLP-PCR were used to identify twenty-four Cladosporium strains. The results showed that the universal primer has the specificity to amplify the conserved region in 24 species as a band in virtual agarose gel. They also showed that the RFLP method is able to identify three Cladosporium spe
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MoreAwsaj (Lycium barbarum) is a plant belong to family Solanaceae serves as a good source of bioactive compounds like phytosterols which have many important biological activity. Literature survey available so far revealed that there was no studies about Iraqi wild Awsaj phytosterols especially B-sitosterol, there for the objective of this study was to examine the efficiency of ultrasound assisted extraction (probe and bath) as compared to the conventional (Soxhlet) extraction method for extraction of phytosterols especially B-sitosterol from fruits, leaves, stems and roots of Iraqi wild Awsaj plant. This goal was achieved by comparing the extraction mass yield, also by a quick and easy approach for identification and quantification of bioac
... Show MoreThe cinematic story depends on many construction techniques that together constitute the story features technically and the secondary events are considered one of these basic techniques that are directly affected by the employment mechanisms inside the cinematic achievement. This subject initiated the two researchers to decide the title of the research: (Mechanisms of Employing Secondary Event in Cinematographic Discourse). The research is divided into an introduction that included the problem details, the aim and defining the terms used. The first section was the act and the event in the cinematic story, which addressed the relation between the act and the event and the nature of the simulation that tries to ascend the human act
... Show MoreDespite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit
... Show MoreThe research, whose goal was to study students' failure in secondary school in Iraq, found that 50% of the Iraqi governorates achieved the lowest student failure rates, and Baghdad governorate had the highest percentage of repeaters. And that half of the provinces in Iraq have males constitute 70% of the repeaters, and failure in the exam represented 79.7% of the reasons for failure, and that half of the students who failed are confined to the first and third intermediate grades at a rate of 51.9% , and the research revealed that the security instability was the most influential factor in Students fai
The calculation of the charge on an isolated dust grain immersed in plasma with different grain sizes is a challenging one, especially under moderately high plasma temperature when secondary electron emission significant. The discrete charging model is used to calculate the charges of dust grain in dusty plasma. In this model, we included the effect of grain size dependence on secondary electron emission. The results show that the secondary electron emission from the glass dust grains due to energetic electron (40eV) can lead to the small grain to be slightly more positive than the large grain. Under these conditions, the smaller and larger grains would be attracted rather than repelled, which possibly lead to enhanced coagulation rates.
... Show More