Motifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the motif structure to parse the motifs, detect, debug the errors, and analyze the motifs template to its components. Many experiments are accomplished using motifs templates of various sizes arranged from 10 Kbase to 10 Mbase, various numbers of gaps arranged from 15 gaps to 15000 gaps, and different numbers of errors arranged from 100 errors to 1820 errors. The proposed systems, in all these experiments, exhibited linear behavior in parsing phase and visualization phase that indicates its scalability to motifs template sizes.
Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
The research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreThe minimization, treatment and disposal of drilling wastes especially oily wastes are important environmental issues.
In this research two fungal isolates named Pleurotus ostreatus and Trichoderma harzianum were chosen carefully f or the purpose of biotreatment of oily drilled cuttings which resulting from drilling oil wells using oil based muds (OBMs).
A relationship of total petroleum hydrocarbon degradation in oily drilled cuttings with time has been obtained. The results showed that Pleurotus ostreatus and Trichoderma harzianum can be considered hydrocarbon degrading microorganisms and the used biotreatment is cost effective process since most of the materials used in the cultivation and growth of the present f
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreSignature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreAggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The research seeks to design a program of guidance in the form of emotional perception rational to reduce the fear of failure, to identify the effect of method of emotional perception rational in reducing the fear of failure. To achieve these objectives, the researcher adopted the null-hypotheses, which assume there are no statistically significant differences in the degree of fear of failure (for the control group) in the pre-posttest. There are no statistically significant differences in the fear of failure (for the experimental group) in the pre-posttest. There were no statistically significant differences in the fear of failure of the groups (experimental and control) after the application of the program in the post-test. In order to
... Show MoreThis study was conducted to prepare protein concentrates from AL-Zahdidate’s pits by using alkaline methods where the chemical composition of the pits were (7.30, 1.04, 5.80, 8.68 and 77.19) % for each of the moisture, ash, protein, fat and carbohydrates respectively and the chemical composition of the concentrate protein was (6.62, 4.10, 26.70, 0.93, and 58.65) % respectively. The content of protein concentrate from the metallic elements (144.07, 25.11, 15.02, 0.49, 0.59, 0.27, 0.22 and 234.6) mg/ 100 g each of potassium, magnesium, calcium, iron, manganese, copper, zinc and phosphorus respectively. The results of SDS-PAGE showed five bands with weights molecular ranged between 11000-70000 Dalton. Give the biscuit which contain protei
... Show More