In view of the large profits made by the sex trade on the one hand, and the minor penalties imposed on the traffickers (brokers) compared with the severe penalties imposed on the drug trade and illegal weapons, on the other hand, this trade has become popular and spread in most countries of the world, and the cornerstones of this trade and A safe haven for them is hotels, especially luxury ones with international brands where their guests are rich and some may look for sex for money. Given the great physical and psychological damage to the victims, this research highlights the civil liability of hotels towards these victims in US and Iraqi law.In order not to limit the
... Show MoreIn this research, the effect of reinforcing epoxy resin composites with a filler derived from chopped agriculture waste from oil palm (OP). Epoxy/OP composites were formed by dispersing (1, 3, 5, and 10 wt%) OP filler using a high-speed mechanical stirrer utilizing a hand lay-up method. The effect of adding zinc oxide (ZnO) nanoparticles, with an average size of 10-30 nm, with different wt% (1,2,3, and 5wt%) to the epoxy/oil palm composite, on the behavior of an epoxy/oil palm composite was studied with different ratios (1,2,3, and 5wt%) and an average size of 10-30 nm. Fourier Transform Infrared (FTIR) spectrometry and mechanical properties (tensile, impact, hardness, and wear rate) were used to examine the composites. The FTIR
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show Moreاستخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA
As many expensive and invasive procedures are used for the diagnosis or follow-up of clinical conditions, the measurement of cell-free DNA is a promising, noninvasive method, which considers using blood, follicular fluid, or seminal fluid. This method is used to determine chromosomal abnormalities, genetic disorders, and indicators of some diseases such as polycystic ovary syndrome, pre-eclampsia, and some malignancies. Cell-free DNA, which are DNA fragments outside the nucleus, originates from an apoptotic process. However, to be used as a marker for the previously mentioned diseases is still under investigation. We discuss some aspects of using cell-free DNA measurements as an indicator or marker for pathological conditions.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More15 local isolates of Pseudomonas were obtained from 35 samples from several sources such as soil, water and some high-fat foods. The ability of isolates to produce lipase was measured by the size of the clarification zone formed around the colonies on the lipase production medium and by measuring the enzymatic activity and specific enzymatic activity, the isolate M3 was found to be the most efficient for production of the enzyme, This isolate was identified by microscopic, morphological, some biochemical tests and genetic diagnosis of 16S gene sequences by using the (PCR) technique, and then comparing the results obtained with the National Center for Biotechnology Inform
... Show More