This study was aimed to establish a database of autosomal Short Tandem Repeat (aSTR) DNA allele frequencies for an Iraqi population living in Baghdad city as a reference, therefore, a total of 456 unrelated individuals were analyzed at 15 STR DNA markers (D3S1358, vWA, FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820, TH01, TPOX, CSF1PO, D19S433, D2S1338, D16S539) included in the Kit from Applied Biosystems. The obtained results revealed that the Combined Matching Probability (CMP) was estimated at 1 in 3.3287 × 10-18, and the Combined Discrimination Power (CDP) was greater than 0.98600987, which is comparable to values obtained with the many other allele frequency databases used in forensic investigations. It can be concluded that for identification purposes, it can be considered the multi-locus STR panels as a useful forensic tool.
The nucleon momentum distributions (NMD) and elastic electron scattering form factors of the ground state for some 1f-2p-shell nuclei, such as 58Ni, 60Ni, 62Ni, and 64Ni
isotopes have been calculated in the framework of the coherent fluctuation model (CFM) and expressed in terms of the weight function lf(x)l2 . The weight function (fluctuation function) has been related to the nucleon density distribution (NDD) of the nuclei and determined from the theory and experiment. The NDD is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of the l
In this article, the boundary value problem of convection propagation through the permeable fin in a natural convection environment is solved by the Haar wavelet collocation method (HWCM). We also compare the solutions with the application of a semi-analytical method , namely the Temimi and Ansari (TAM), that is characterized by accuracy and efficiency.The proposed method is also characterized by simplicity and efficiency. The possibility of applying the proposed method to many types of linear or nonlinear ordinary and partial differential equations.
Abstract: In the present work, the heat transfer of Nano Aluminum Oxide -NAO- has been studied practically to define the appropriate insulation conditions. This study focuses on finding of the amount of heat transfer through a glass substrate that is coated with nanoalumina doped on PMMA matrix. The optical and thermal properties were systematically investigated. The density of heat flow rate, was calculated in the range values (240-260) W/m2 while the optimum values confine between (250-260) W/m2 at temp. (25-35)Co. The results showed that the thermal insulation of the sample was significantly enhanced at temp. (30-50)Co. The simulated net heat transfer through window decreased linearly with incr
... Show MoreA square experimental arena with vegetation on one interior side was deployed in a Sharjah, United Arab Emirates desert. Individual darkling beetles (Coleoptera, Tenebrionidae) Akis subtricostata Redtenbacher, 1850 and Trachyderma philistina Reiche and Saulcy, 1857 were placed inside the arena at temperatures ranging between 27 - 49°C. Whether they chose the vegetated side of the arena or not was recorded, as well as how long it took for them to reach the vegetated side, if they chose it. Both species preferred the vegetated side at all temperatures, and the chance of them choosing the vegetated side increased significantly with increasing temperature (logistic regression, p = 0.0096 and p = 0.0003 for
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreThere are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreIntrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show MoreBeing the meeting points of the world different languages and out of a scholarly perspective, comparative literature represents a cultural leap as well as an artistic and intellectual development or a global literary movement of both prose and poetry. Such homogenous literary structure requires a systematic and coherent study of the literary output of the people different cultures and civilizations. It also represents the theoretical approach of the present study that debates a systematic comparison between Ghassan Kanafani’s All That's Left to You and William Faulkner’s. The Sound and the Fury. Within the perspective of the descriptive analysis approach, the present paper discusses th
... Show More