Preferred Language
Articles
/
jih-1659
Molecular Cloning of large DNA Fragments of The Sal t Tolerant wild Tetra ploid bermudagrass Cynodon Dactylon L. Using A Bacteriophage Cloning Vector 2. Ligation a nd in vitro packaging of The Recombinant Phage DNA Molecules
...Show More Authors

This  paper represent  the second  step  i n  a molecular clon i ng program ai ming to clone large DNA  fi·agmen ts of the sal t tolerant  bermudagrass (Cyrwdon  dactylon  L.)  DNA  usi ng  the  bacteriophage  (EM13L3) as    a vector.

In th is  work, a yield of about  I 00  g bacteriophage  DNA  per one  liter culture.was obtained  with.a  purity ranging between (1.7-1.8). The vector JJNA  v.as  completely   double   digested   with  the  restriction   enzymes llamHI   and  EcoRI,  followed  by  purification  of  vector  arms. llacteriophage  anns   were  also   efficiently   ligated   with   the   partially digested   bermudagrass  DNA  (prepared  earlier).  The  optimum   ligation

ratio  or arms:  inserts  (EMBL3:  bermudagrass)   was  found  to  be  4: I

respectively. The  recombinant  DNA  was successfu lly in vitro packaged and     plated  on  a P2  lysogen  E. coli (strain  N M539).  An efficiency  of about  1.3x I 06 pfu/ tg recombi l1311l     ph age DNA was determined  in these ex periments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA
...Show More Authors

استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Theoretical calculations involving a standard neutron yield distribution for the T-T nuclear fusion reaction
...Show More Authors

A standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Kirkuk University Journal
DNA Sequences of qacE∆1 gene in Pseudomonas aeruginosa isolated from wounds and burns infections.
...Show More Authors

Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The role of the media in promoting tolerant religious values: intellectual study
...Show More Authors

Research summary

Informing means informing and informing, which is conveying information to someone and confirming his narration with it. Accordingly, information is its main content..and it has multiple means, including visual, audio and read, and it has become the dominant role in the process of socialization, and much of what we hear, read, or watch in the media is not devoid of a goal, and expresses that scientifically as “charged with values” ( Value Loaded)..Values that are: the set of beliefs that the individual holds towards things, meanings, and various aspects of activity, which direct his desires and attitudes towards them, and determine for him acceptable and unacceptable behavior, right and wrong, and all of this

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Comparative Study for the Accuracy of Three Molecular Docking Programs Using HIV-1 Protease Inhibitors as a Model
...Show More Authors

Flexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Fuzzy Logic Controller Based Vector Control of IPMSM Drives
...Show More Authors

This paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref