Vitamin D receptor (VDR) is a nuclear transcription factor that controls gene expression. Its impaired expression was found to be related to different diseases. VDR also acts as a regulator of different pathways including differentiation, inflammation, calcium and phosphate absorption, etc. but there is no sufficient knowledge about the regulation of the gene itself. Therefore, a better understanding of the genetic and epigenetic factors regulating the VDR may facilitate the improvement of strategies for the prevention and treatment of diseases associated with dysregulation of VDR. In the present investigation, a set of databases and methods were used to identify putative functional elements in the VDR locus. Histone modifications, CpG Islands, epigenetic marks at VDR locus were indicated. In addition, repeated sequences, enhancers, insulators, transcription factor binding sites and targets of the VDR gene, as well as protein-protein interactions with bioinformatics tools, were reported. Some of these genetic elements had overlapped with CpG Islands. These results revealed important new insight into the molecular mechanisms of the VDR gene regulation in human cells and tissues.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More
ملخص البحث:
ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.
اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل
... Show MoreConsidering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u
... Show MoreIn this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.
ان السبب الرئيسي لاختيار الموضوع كونه من الاساليب الادارية الحديثة التي تهدف الى انجاح المنظمة او الشركة المبحوثة, اذ تمثلت مشكلة البحث في ما دور الادارة بالرؤية المشتركة في تعزيز التسويق الابداعي بالشركة المبحوثة, يهدف البحث الى تسليط الضوء على مفهوم الادارة بالرؤية المشتركة وانعكاساتها على التسويق الابداعي للمنظمة ، باعتبارها منهج اداري حديث يسهم في تغيير وتجديد وتطوير واقع المنظمة المبحوثة( الشرك
... Show Morewith intellectual and philosophical in modern administrative thought. The focus of the target on the identification of the strategic concept of human resource management practices in business organizations. It studied the scientific concept, in terms of how it has been the shift from personnel management, and to human resources management, and then to HR management strategy. The research has included extensive serious discussions about the nature of the changes, and how to determine the nature and content of the strategic perspective of human resources management in the changing and volatile world of business. It was also the explanation and clarification theoretical philosophies that came in various previous studies, and i
... Show More