Survivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe
... Show MoreAbstract
The current research is attempt to test the reflection of the lean management on the human resources management practices of two of the most important communication companies operating in Iraq (`Zain & Asia cell), The research aims to Determine the extent of adoption of the lean management approach in the two researched companies, as it improving human resource management practices. The research problem represented in the existence of lack of in some aspects of the application the lean management approach in service sector and neglecting the impact of its tools on the human resource management practices. For this purpose three principle research hypotheses has been formulated, first there is a correlation rel
... Show MoreThis study aims at examining the effectiveness of using the narrative approach in teaching the Interpretation of the Qur'an course in the development of conceptual comprehension among first-grade middle school female students. To achieve the objective of this study, a quantitative quasi-experimental design has been used. The sample consisted of first-grade middle school female students at "the third middle school" in Buraidah city, as this school suits the objective of the study. A test of conceptual understanding has been built by the researchers according to a list of conceptual understating skills at a significance level of α ≤ 0.05. Results have shown that there are statistically significant differences at the level (α ≤ 0,05)
... Show MoreCentral and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
The importance of research is to be considered by highlighting the tax policy in Iraq which extended for successive measurement of the amount of tax receipts for respective periods, the research problem represents security, economic and political issues that Iraq suffered which were very difficult since Nineties of the last century until now that led to a lake of clarity in tax policy trends, volatility in it and finally reflected on the tax revenues increase or decrease. One of the main recommendations of the research is: (The necessity to develop a deliberate strategy for tax policy in Iraq which should take into account financial, economic, and social goals in appropriate way).
This paper deals with the subjective reflections of consumer values on fashion design. The consumer self is determined by the consumer's idea of himself, according to the intellectual, spiritual and social values, and these values take their intellectual reflection in the form of material values that the consumer finds in fashion design. These values are based on considerations between what is intellectual represented by the values of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The consumer self gets its material image represented in the
... Show MoreAbstract
Experimental work from Magnetic Abrasive Finishing (MAF) tests was carried out design parameters (amplitude, and number of cycle which are formed the shape of electromagnetic pole), and technological parameters (current, cutting speed, working gap, and finishing time) all have an influence on the mechanical properties of the surface layer in MAF process. This research has made to study the effect of design and technological parameters on the surface roughness (Ra), micro hardness (Hv) and material removal (MR) in working zone. A set of experimental tests has been planned using response surface methodology according to Taguchi matrix (36) with three levels and six factors
... Show MoreThe aim of this research is to assess the validity of Detailed Micro-Modeling (DMM) as a numerical model for masonry analysis. To achieve this aim, a set of load-displacement curves obtained based on both numerical simulation and experimental results of clay masonry prisms loaded by a vertical load. The finite element method was implemented in DMM for analysis of the experimental clay masonry prism. The finite element software ABAQUS with implicit solver was used to model and analyze the clay masonry prism subjected to a vertical load. The load-displacement relationship of numerical model was found in good agreement with those drawn from experimental results. Evidence shows that load-displacement curvefound from the finite element m
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More