Preferred Language
Articles
/
ihYYv4sBVTCNdQwCM9q8
Finite State Automata Generator for DNA Motif Template as Preparation Step for Motif Mining
...Show More Authors

There are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif templates and offers novel algorithm to accomplish this. It is tested using many simple and compound motif templates of different sizes and various numbers of gaps that have unlimited ranges of intervals. The motifs sizes are up to 2M Bases. The motif templates include up to 2000 gaps and the interval of a gap is [1,100] up to [1, 1000000]. All of these cases were processed successfully.

Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 03 2018
Journal Name
Baghdad Science Journal
Diamine Derivatives as Photostabilizers for Thermoplasticized Poly(Vinyl Chloride) [I]
...Show More Authors

The photostabilization? of poly vinyl chloride (PVC) ? films has been investigated by using diamine derivatives. The? (PVC) films were? contained 0.5% weight? of diamine derivatives which prepared by the method of casting. The photostabilizations? ?of these compounds were determined by monitoring the carbonyl index value with irradiation time. Also, the effect ?of concentrations of additives (range 0.1-0.5wt) on the rate of photostabilization? process was studied. Therefore we found? that a increased photostabilization rates was increase with increasing? concentrations of compound. Besides, the influence? on film thickness? of photostabilization process was also studied; ?and the results? showed that? the increasing of film thickness incr

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Glutamic Acid as Corrosion Inhibitor for Aluminium in Acidic Medium
...Show More Authors

 Corrosion behavior of aluminium in 0.6 mol. dm-3 NaCL solution in acidic medium (      ) was investigated in the absence and presence of different concentrations of amino acid, glutamic acid, as environmentally – friendly corrosion inhibitor over temperature range (293-308)K. The investigation involved electrochemical polarization method using potentiostatic technique and optical microscopy, the inhibition efficiency increased with an increase in inhibitor concentration but decreased with increase in temperature. Results showed that the inhibition occurs through adsorption of the inhibitor molecules on the metal surface and it was found to obey Langmuir adsorption isotherm. Some thermodynamic paramet

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
CuInS2 Ternary Compound as Absorption Layer for Solar Cell Fabrication
...Show More Authors

Copper indium disulphide, CuInS2, is a promising absorber material for thin film photovoltaic which has recently attracted considerable attention due to its suitability to reach high efficiency solar cells by using low cost techniques. In this work CuInS2 thin films have been deposited by chemical spray pyrolysis onto glass substrates at ambient atmosphere, using different [Cu]/[In] ratio in the aqueous solutions at substrate temperature 3000C
and different annealing temperatures . Structural and optical properties of CIS films were analyzed by X-ray diffraction, and optical spectroscopy. Sprayed CIS films are polycrystalline with a chalcopyrite structure with a preferential orientation along the 112 direction and no remains of oxides

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 21 2022
Journal Name
Journal Of Petroleum Research And Studies
Smart Well Modelling for As Reservoir in AG Oil Field
...Show More Authors

Intelligent or smart completion wells vary from conventional wells. They have downhole flow control devices like Inflow Control Devices (ICD) and Interval Control Valves (ICV) to enhance reservoir management and control, optimizing hydrocarbon output and recovery. However, to explain their adoption and increase their economic return, a high level of justification is necessary. Smart horizontal wells also necessitate optimizing the number of valves, nozzles, and compartment length. A three-dimensional geological model of the As reservoir in AG oil field was used to see the influence of these factors on cumulative oil production and NPV. After creating the dynamic model for the As reservoir using the program Petrel (2017.4), we

... Show More
View Publication
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (31)
Crossref (18)
Scopus Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Commitment of Public Companies in disclosure requirement of Financial Statement: Analysis Study in State Company for Leather Industries (SCLI)
...Show More Authors

It has been an increase concern of scientific and professional accounting sides on disclosure especially after appearance of business firms and accounting development with its relationship to financial statements which are considered to be outputs of the activity results.  The preparing of financial statements and auditing of those accounts according to normal principles and standards of accounting on both local and international levels. Accounting disclosure can be seen an importance through discover all fundamental and necessary information for proper supply. Therefore, the research will highlight on public companies commitment in Iraq for basis and standards which have taken disclosure in financial data. The conceptual frame of t

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of local tax revenues in financing local development: Case Study of Tebessa State for the Period[2010-2014[
...Show More Authors

Local communities are in need of self-resources so that they can perform their multiple functions which serve the objectives of the local development, and tax revenues are considered as important sources of their funding. However, despite the efforts of the state to reform the fiscal system and to improve the management in the local administration, tax collection can increase when the state adopts a more effective policy to combat tax evasion and tax fraud. Accordingly, this research aims to shed light on the role of local tax revenues in the local development. A set of conclusions are drawn; the most important one is that Algeria, in order to achieve local development, has taken a set of reforms, which are still valid until now. The mos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 27 2020
Journal Name
Journal Of Physics: Conference Series
Investigation of the State Vectors and Prediction of the Orbital Elements for Spot-6 Satellite during 1300 periods with Perturbations
...Show More Authors
Abstract<p>Computer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4<sup>th</sup> order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculation the Cross Sections of 10B(n,p)10Be Reaction by Using the Reciprocity Theory for the First Excited State
...Show More Authors

  In this study light elements 10B , 10Be for 10B(n,p)10Be reaction as well as proton energy from 0.987 MeV to 2.028 MeV with threshold energy (1.04MeV) are used according to the available data of reaction cross sections. The more recent cross sections data of 10Be(p,n)10B reaction is reproduced in fin steps in the specified energy range , as well as cross section (p,n) values were derived from the published data of (n,p) as a function of energy in the same fine energy steps by using the reciprocity theory of principle inverse reaction . This calculation involves only the first excited state of  10B , 10Be in the reactions 10Be(p,n)10B and  10B(n,p)10Be. 

View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More