Preferred Language
Articles
/
ihYYv4sBVTCNdQwCM9q8
Finite State Automata Generator for DNA Motif Template as Preparation Step for Motif Mining
...Show More Authors

There are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif templates and offers novel algorithm to accomplish this. It is tested using many simple and compound motif templates of different sizes and various numbers of gaps that have unlimited ranges of intervals. The motifs sizes are up to 2M Bases. The motif templates include up to 2000 gaps and the interval of a gap is [1,100] up to [1, 1000000]. All of these cases were processed successfully.

Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
The International Journal Of Biotechnology,
LACTIC ACID AS SPACER BETWEEN POLY ACRYLIC ACID AND 4- AMINOANTIPYRINE
...Show More Authors

Preview PDF
Publication Date
Sun Sep 01 2024
Journal Name
Rafidain Journal Of Science
Therapeutic Potential of Bacterial Pigments as Antimicrobial Agents A Review Article
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 17 2020
Journal Name
Cihan University-erbil Scientific Journal
Characterization of Lactobacillus Isolates from Human Mouth and Feces as Probiotics
...Show More Authors

Probiotics are live microbes that give many health benefits to human beings and animals, the most studied and commonly used probiotics are Gram-positive bacteria; lactobacilli and bifidobacteria. At nowadays, Lactobacillus spp. constitute more than two-thirds of the total numbers of probiotic species. The present study aimed to characterize Lactobacillus that locally isolated from human mouth and feces as probiotics. A total of three Lactobacillus isolates; Lactobacillus fermentum Lb2, Lactobacillus rhamnosus Lb9, and Lactobacillus paracasei Lb10 were investigated in respect to acid and bile salts tolerance, antibiotics susceptibility, and cell surface hydrophobicity in vitro using bacterial adhesion to hydrocarbons method. In compa

... Show More
View Publication
Crossref
Publication Date
Sun Jul 17 2016
Journal Name
2016 Asabe International Meeting
THE PERFORMANCE OF FARM TRACTORS AS REPORTED BY CAN-BUS MESSAGES
...Show More Authors

View Publication
Scopus (16)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
Weighting between the texts as the ruling when Imam Al-Salmi
...Show More Authors

abstract:

Objectives: The study aims to reveal the approach of Imam Al-Salmi in the weighting between the apparently conflicting texts, and to show the extent of his agreement and disagreement with the rest of the fundamentalists, and does he have vocabulary that can be used to elicit legal rulings in modern contemporary issues?

Method: The method of induction and analysis is one of the main tools to reach the research results. The study resorted to following the sayings of Imam Al-Salmi in various sources and fatwas and standing on them, then analyzing and applying them to the various branches of jurisprudence in the various jurisprudential chapters.

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Ssrn Electronic Journal
Silence as a Tactic of Communication in Pragmatics, Novel, and Poetry
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Design contexts in interior space design (sewing workshops as a model)
...Show More Authors

The topic of context is one of the important topics, which was mentioned as a concept in several fields and different fields, and there were many points of view that defined that concept.
He specified the title of the research (design contexts in the design of the interior space), as the research sought to identify the concept of context in the interior design of the spaces of sewing workshops. The research was divided into four chapters:
The first chapter, which consists of the methodological framework, the problem of research and the need for it, the importance of research, the goal and limits of research for sewing workshops for vocational schools from (2020-2021).
The second chapter: consists of previous studies and the theo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Cutaneous Leishmaniasis as Imitator of Skin Diseases and a Diagnostic Challenge
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Revue Académique De La Recherche Juridique
Humanizing Legal Rules (The Winter Truce in France as a Model)
...Show More Authors

Since the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.

View Publication