A fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
The problem of the current paper is embodied in the weakness of the female students
of the department of the Quran sciences in the college of Education for Women in the
University of Baghdad in the subject of reciting and memorizing the Holy Quran. This is what
the professors and the scientific and educational supervisors stress equally through their visits
to the students applicants during the period of their practical application of teaching in the
schools; especially that the subject is thought for four years during their study in the college.
That weakness is so explicit with a quite large number of the students-applicants, who are
supposed to be the future teachers in the subject of the Holy Quran and Islamic Ed
The research work was conducted to investigate the effect of oral administration of water extract of black pepper at doses of (1, 5) mg/kg body weight for two weeks daily by determining the genotoxic effect (mitotic index), evaluation of immunological effect (IgG, IgM, IgA, C3, C4) and measuring fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) levels with histopathological examinations of female albino swiss mice ovaries in comparison with control (normal saline). A clear effect in increasing mitotic activity was reveled for both doses in comparison with control. Results also showed a significant increase in the value of the all immunological parameters at both doses in comparison with control. Also obvious rais
... Show MoreThe study was conducted to evaluate the effect of essential oil extracted from yellow peels of Citrus aurantium on the radial growth of all fungi. Penicillium expansum, Aspergilus flavus and Fusarium oxysporum. The results showed significant gradual reduction of the surface growth of fungi, P. expansum and A. flavus was more affected by the essential oil, while F. oxysporum showed less sensitivity towards the essential oil. The reaction of growth was inconcommitant with increasing concentrationsof oil, reaching concentration of (5)% which showed complete inhibition.
جريت دراسة مختبرية لمعرفة تأثير الزيت الطيار لقشور ثمار نبات النارنج الصفرC. aurantium تجاه النمو السطحي للفطريات Penicillium expansum، Aspergillus flavus و Fusarium oxysporum ، أظهرت نتائج الفعالية التثبيطية للزيت الطيار تأثيراً معنويا متفاوتاً في الفطريات المشمولة بالدراسة، إذ كان الزيت الطيار أكثر تأثيرأَ في الفطر P. expansum تلاه الفطر A. flavus ،في حين كان الفطر oxysporum F.أقل حساسية تجاه الزيت الطيار. بصورة عامة اظهر الزيت الطيار تأثيرا تثبيطيا
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show Moreتمهيد
غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.
ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التط
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreMultilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d