This study confirms the ubiquitin conjugating enzyme 2B (Rad6) plays a significant role in the DNA repair pathway also because the ubiquitin-conjugating pathway. The DNA repair pathway could be a variety of bypass repair mechanism where the broken base pair is bypassed by permitting the replication fork to labor under the site of injury. This is often done by a shift mechanism wherever deoxyribonucleic acid enzyme - δ is switched with DNA enzyme - η (DNAP - η). Site of DNAP - η is massive enough to permit the broken ester to labor under, and so bypass the broken nucleotide. However, this is often potential solely through the involvement of Proliferating cell nuclear antigen (PCNA) that could be a processivity issue and it acts as a plat
... Show MoreThe research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a
... Show MoreSecure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
Image compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye
... Show MoreThere are great figures in our nation, who are famous for their encyclopedia in their sciences, and their fame spreads across the horizons for what they presented to their religion and nation.
So they became torches of guidance, advocates of goodness, and treasuries of knowledge until God inherits the earth and those on it.
Among these imams is Imam al-Qurtubi, who died in the year (671 AH), after whom he left a great legacy of valuable books, including this one, which is the subject of my research, his valuable interpretation (Al-Jami’ Li Ahkam Al-Qur’an). Taking from him and his approach in interpreting the verses of judgment, following the method of extrapolation, investigation and deduction to know his style, which he used
In this work a hybrid composite materials were prepared containing matrix of polymer (polyethylene PE) reinforced by different reinforcing materials (Alumina powder + Carbon black powder CB + Silica powder). The hybrid composite materials prepared are: • H1 = PE + Al2O3 + CB • H2 = PE + CB + SiO2 • H3 = PE + Al2O3 + CB + SiO2 All samples related to electrical tests were prepared by injection molding process. Mechanical tests include compression with different temperatures and different chemical solutions at different immersion times The mechanical experimentations results were in favour of the samples (H3) with an obvious weakness of the samples (H1) and a decrease of these properties with a rise in temperature and the increasing
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreNowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s
... Show More