Along with RNA and proteins, DNA is one of the three major macromolecules that are essential for all known forms of life. DNA is a long polymer of two helical chains, each measuring 2.2-2.6 nanometers (nm) and one nucleotide unit measuring 0.33 nm long. Although individual repeating unit is very small, DNA polymer, containing millions of nucleotides (approximately 220 million base pairing long (1,2).
The cadastral map is very important because it has technical and materialist
specification of the property borders and these maps which are land registration
based on it in Iraq, the problem is an ancient maps and unfit for use, despite its
importance, Therefor the updating and digitize the cadastral map is very pivotal, this
is what we have done in the present work.
In the present work, we have an old cadastral map (as a paper) was made in 1932
with modern satellite image (Quick Bird ) 2006, which has 61 cm resolution for the
same area after. Geometric correction technique has been applied by using image-toimage
method or (image registration ) and after that we get new agricultural cadaster
map and connect the
Background: Cholera has been recognized as a killer disease since earliest time. The disease is caused by infection of the small intestine by Vibrio cholerae O1 and O1391 which is characterized by severe dehydrating diarrheal condition and is one disease in modern times that is epidemic, endemic and pandemic in nature. Objective: This study was carried out to detect and isolate V. cholerae from patients suffered from watery diarrhea, which may cause severe complications such as dehydration, shock followed by death. Materials and methods: stool specimens were collected from 308 patients with watery diarrhea. These samples were tested with many criteria such as TCBS agar, gram stain, biochemical tests and VITEK-2 system to improve the isolati
... Show MoreMany isolated rural communities are located in regions where there is an abundant and reliable supply of solar energy, but where the distance to the nearest power station is many tens or even hundreds of kilometre. It is therefore mainly in these areas that rural electrification is now being provided by PV generators. since Stand-Alone PV generator can offer the most cost-effective and reliable option for providing power needed in remote places. Accordingly these isolated rural canters are fitted with PV for lighting, a refrigerator, a television and socket to supply kitchen appliances
In this paper, the Adomian decomposition method (ADM) is successfully applied to find the approximate solutions for the system of fuzzy Fredholm integral equations (SFFIEs) and we also study the convergence of the technique. A consistent way to reduce the size of the computation is given to reach the exact solution. One of the best methods adopted to determine the behavior of the approximate solutions. Finally, the problems that have been addressed confirm the validity of the method applied in this research using a comparison by combining numerical methods such as the Trapezoidal rule and Simpson rule with ADM.
The DEM (Digital elevation model) means that the topography of the earth's surface (such as; Terrain relief and ocean floors), can be described mathematically by elevations as functions of three positions either in geographical coordinates, (Lat. Long. System) or in rectangular coordinates systems (X, Y, Z). Therefore, a DEM is an array number that represents spatial distributions of terrain characteristics. In this paper, the contour lines with different interval of high-resolution digital elevation model (1m) for AL-khamisah, The Qar Government was obtained. The altitudes ranging is between 1 m – 8.5 m, so characterized by varying heights within a small spatial region because it represents in multiple spots with flat surfaces.
In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreThis paper examines the change in planning pattern In Lebanon, which relies on vehicles as a semi-single mode of transport, and directing it towards re-shaping the city and introducing concepts of "smooth or flexible" mobility in its schemes; the concept of a "compact city" with an infrastructure based on a flexible mobility culture. Taking into consideration environmental, economical and health risks of the existing model, the paper focuses on the four foundations of the concepts of "city based on culture flexible mobility, "and provides a SWOT analysis to encourage for a shift in the planning methodology.
In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.
Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Fes Airport, run by the National Airports‟ Office in Morocco, aspires to be certified by the ISO 9001: 2015 standard; Hereby, it has to meet the needs of the stakeholders‟ expectations in an attempt to promote the airport activities, it has also to take into consideration the risks that are related to the various actors who have well-set priorities and expectations.
The aim of this article is to shed light on the interconnection between the various participants in an attempts to meet the new requirement 4.2 of the ISO 9001: 2015 and to examine the dangers of the integrated management system (QSE) taking into consideration the proposal of an action plan to monitor interfaces, and to promote the application of an integrated