The types of development potential in the city vary, from the nature of city, to its society, environment, economy, and history. The city of Baghdad contains many historical development potentials out of using, and most of them towards declining, this will be the research problem, within the aim of trying to clarify how to invest one of the important historical elements in the development of the city, based on the hypothesis that the sustainable development of the city should be stand on the activation of its historical assets. The historical wall of Baghdad is located on the Rusafa side, which is a wall that has not been left except for one gate and the site of another gate from it is f
... Show MoreSchmidt Cassegrain spider obscuration telescope (SCT) is one of the types of observations operating with a concave mirror. It combines several lenses and mirrors working together as an optical system. The light rays fall into the tube from the main mirror and gather on another smaller mirror called a secondary mirror. Unlike the formation of Newton's telescope, no light is made from the secondary mirror out the side of the tube but is directed to the middle of the main mirror. There is an opening in the middle of the main mirror so the light beam can go out and direct the vision lens system. The secondary mirror is located in the middle of a glass slice and is installed by thin carriers. The function of this board is to correct the portr
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreAs many expensive and invasive procedures are used for the diagnosis or follow-up of clinical conditions, the measurement of cell-free DNA is a promising, noninvasive method, which considers using blood, follicular fluid, or seminal fluid. This method is used to determine chromosomal abnormalities, genetic disorders, and indicators of some diseases such as polycystic ovary syndrome, pre-eclampsia, and some malignancies. Cell-free DNA, which are DNA fragments outside the nucleus, originates from an apoptotic process. However, to be used as a marker for the previously mentioned diseases is still under investigation. We discuss some aspects of using cell-free DNA measurements as an indicator or marker for pathological conditions.
استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More