The dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthorized searches by those involved. In addition to securing inquiries, making calculations on this data, and generating differential privacy and garbled circuits, cryptography is considered one of the important solutions to this problem. This paper introduces most of the important challenges related to maintaining privacy and security and classifies each problem with appropriate, proposed, or applied solutions that will fuel researchers' future interest in developing more effective privacy-preserving methods for genomic data.
The policy issue in all countries of the world is concerned with government and research because it has the ability to reveal many of the problems facing the state and its organizational and scientific capabilities in the development of solutions and appropriate treatments that go beyond random and improvisational reactions, As a result of this interest, many studies have attempted to conceptualize and academicism it. The concept of public policy has been linked to various aspects of social life such as social, economic, educational, agricultural or other aspects. Public policy, regardless of its meaning or its relation to aspects of life, refers to the systematic thinking that directs the behavior and actions of the state, organization
... Show MoreDifferent ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
The inflammatory reactions cause nasal polyposes (NPs), which contained the paranasal sinuses and the nasal mucous membrane. They consist of recurrent multiple masses originating in the paranasal sinuses then spread from the middle meatus to the nasals cavity, which leads to the nasal blockage that causes the restriction of airflow to the olfactory area. This study aims at clarifying the role of IL-12RB2 polymorphism by using PCR technology in nasal mucosal stem cells in nasal polyps of Iraqi patients and use it as a biomarker. Fifty-eight cases of this study are referred to as nasal surgery, which selected from Dept.of Otolaryngology, Baghdad City, Iraq from May 2013 to January 2014. They were grouped into Control group (022 samples
... Show MoreIn this paper, the bi-criteria machine scheduling problems (BMSP) are solved, where the discussed problem is represented by the sum of completion and the sum of late work times simultaneously. In order to solve the suggested BMSP, some metaheurisitc methods are suggested which produce good results. The suggested local search methods are simulated annulling and bees algorithm. The results of the new metaheurisitc methods are compared with the complete enumeration method, which is considered an exact method, then compared results of the heuristics with each other to obtain the most efficient method.
The political participation of the Iraqi woman, gains a big importance equivalent to its role in all other fields. Therefore , it represents a higher value in the democratic orientation in addition to the importance of rising the reality of the woman specifically in the fields that are considered as a scale of the human development like the income, health, and education . The weakness of womenʹs political participation, is something that can't be ignored or neglected if we are looking forward to the rising of the country᾽s reality and achieving the required development in its all aspects. The woman is half of society or more than that due to the burden of raising the generations tasks. This can be achieved by taking part in th
... Show MoreChina and India are considered both rising countries, and both are among the world's most populous and fastest growing economies. The long-term growth of both China and India has reinforced the importance of their bilateral relationship. The relations between China and India are complex, as relations between them have undergone great changes during the past seven decades, ranging from friendship to hostility. This study proceeds from the hypothesis that the nature and path of Sino-Indian relations after 2013 are affected by several factors and variables, some of which represent opportunities, others represent challenges and obstacles. Several opportunities have contributed to the reformulation of bilateral relations in terms of mutual ga
... Show MoreThis paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show More