استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA
ABSTRACT
The Iraqi Government had used all Possible methods of financing the fiscal deficit according to the economic and Political Circumstances at the time. It had borrowed from abroad during the 1980s. Those methods of borrowing led to negative impacts on the Iraqi economy such as increased external dept burden, higher inflation rate, negative interest rate and accumulation of domestic debt.
The "Financial Management and Public Debt" law no 95/ 2004 made a great change in those methods of Financing fiscal deficit in Iraq. Before 2004, the deficit was financed by issuing Treasury Bills and selling them to the Central Bank of Iraq with a prefixed interest rate. Thus, i
... Show Moreلا تحصى تلك الكتابات والمؤلفات التي تناولت اخلاقيات الاعمال (Business ethics) لكن الورقة الحالية التي سنقوم مخلصين بنقلها للعربية ليست مثلها أية مقالة قرأناها، فهي متفردة في اثارتها للموضوع في اطار الطروحات الفكرية لبعض رواد علم الادارة من المؤسسين الذين برزت شهرتهم في مرحلة ستينات القرن العشرين، وهم:
- W. Taylor
- I. Barnard
- F. Drucker
... Show More
لا يتسع هنا المجال لأستعراض كامل الخلفيات التاريخية التي انتجت اوضاعنا الاجتماعية والاقتصادية والسياسية المتأزمة الحالية، وجل ما يمكن قوله هو ان الشعب العراقي وخلال ما يربو على ربع قرن لم يحصد سوى عدد من الحروب والعقوبات الدولية فالازمات التي ولدت الرعب والجوع المستمر للشعب حتى يومنا هذا.
لقد كان الاقتصاد الوطني اول واكبر المتضررين من تلك الازمات ومن سياسات الدولة غير العقلانية فكانت ال
... Show MoreManagement is considered as most important resource of the society ones in modern era and an exchange
point in societies’ lives in order to achieve its goals and wishes. So far, management behinds the new
electronic society has become different in shape and nature due to the force of the nature of information
technology that shapes the relationships between the world’s individuals at the national level but it goes
beyond the international ones. The study aims at identifying the impact of the electronic management’s
components upon the improvement of the quality of nursing care in Baghdad’s hospitals. The descriptive
design, with a sample-survey approach, is used as appropriate ones for the field study of social 
The root-mean square-radius of proton, neutron, matter and charge radii, energy level, inelastic longitudinal form factors, reduced transition probability from the ground state to first-excited 2+ state of even-even isotopes, quadrupole moments, quadrupole deformation parameter, and the occupation numbers for some calcium isotopes for A=42,44,46,48,50 are computed using fp-model space and FPBM interaction. 40Ca nucleus is regarded as the inert core for all isotopes under this model space with valence nucleons are moving throughout the fp-shell model space involving 1f7/2, 2p3/2, 1f5/2, and 2p1/2 orbits. Model space is used to present calculations using FPBM intera
... Show MoreThere are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More 
        1.jpg)
