Preferred Language
Articles
/
iqjmc-324
Identification of an unknown person using Y-chromosome markers and mitochondrial dna typing
...Show More Authors

Background: The present article is concerned within the scope of Forensic Medicine, specifically Forensic Genetics. The case was taken care of in the Genetic-Molecular Laboratory of the Odessa Regional Bureau of Forensic-Medical Examinations, in Ukraine, during January and February of 2014.
Objectives: The aim of our work was to identify an unknown person, using the techniques: Y-chromosome markers and mitochondrial DNA typing.
Materials and methods: The materials available for our procedure were: pieces of tissue in paraffin blocks, saved from the corpse of the unknown person; blood from a living male subject, who claimed to be the grandfather, and from two females, allegedly the sisters. From all of them we extracted nuclear DNA (nDNA) and mitochondrial DNA (mtDNA) respectively, that was analyzed to compare and draw the proper conclusions.
Results: The analyzed genetic materials confirmed the kinship.
Conclusion: Using Y-chromosome markers we were able to establish the correspondence of the subject to his paternal line, and by mitochondrial DNA typing we could establish his relation to the proper maternal line.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Dec 25 2024
Journal Name
Al–bahith Al–a'alami
International Public Relations methods in building the state's image through Cyberspace
...Show More Authors

The researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Science
On Lie Structure in Semiprime Inverse Semirings
...Show More Authors

In this paper we introduce the definition of  Lie ideal on inverse semiring and we generalize some results of Herstein about Lie structure of an associative rings to inverse semirings.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Amino Acids as Environmentally-Friendly Corrosion Inhibitors for 2024 Aluminium Alloy in Akaline Medium
...Show More Authors

The corrosion behavior of 2024 aluminium alloy was investigated in alkaline medium (pH=13) containing 0.6 . in absence and presence of different concentrations of three amino acids separately [Methionine, Glutamice acid and Lysine] as environmentally friendly corrosion inhibitors over the temperature range (293-308)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency increased with an increase of the inhibitor concentration but decreased with increase in temperature . The maximum efficiency value was found with lysine =80.4 of 293 k and 10 . concentration of lysine. The adsorption of the amino acids was found to obey Langmuir adsorption isotherm . Some thermodynamic parameter âˆ

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization of 2-azido-4-(azido (2-azido-2-( azido carbonyl)-1,3-dioxoian-4-yl)methyl)– 5-((R-azido (hydroxyl) methyl- 1,3-dioxole-2-carbonyl azide. ethanol. hydrate (L-AZD) with Some Metal Complexes
...Show More Authors

The reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal

... Show More
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Soc-Semi-Prime Sub-Modules
...Show More Authors

     In this paper, we study a new concept of fuzzy sub-module, called  fuzzy socle semi-prime sub-module that is a generalization the concept of semi-prime fuzzy sub-module and fuzzy of approximately semi-prime sub-module in the ordinary sense.  This leads us to introduce level property which studies the relation between the ordinary and fuzzy sense of approximately semi-prime sub-module. Also, some of its characteristics and notions such as the intersection, image and external direct sum of fuzzy socle semi-prime sub-modules are introduced. Furthermore, the relation between the fuzzy socle semi-prime sub-module and other types of fuzzy sub-module presented.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Discriminant Analysis to Assess Deprivation Index in Iraq
...Show More Authors

The aim of this study is to achieve the best distinguishing function of the variables which have common characteristics to distinguish between the groups in order to identify the situation of the governorates that suffer from the problem of deprivation. This allows the parties concerned and the regulatory authorities to intervene to take corrective measures. The main indicators of the deprivation index included (education, health, infrastructure, housing, protection) were based on 2010 data available in the Central Bureau of Statistics

View Publication Preview PDF
Crossref