Preferred Language
Articles
/
jih-2648
Genomics and Molecular Phylogenetics Tree Analysis of Actinopolyspora Iraqiensis
...Show More Authors

Actinopolyspora iraqiensis IQ-H1 is a novel strain of actinobacteria isolated from extremely halophilic soil samples in Iraq. The whole-genome sequence of this strain is deposited in the National Center for Biotechnology Information (NCBI) GenBank under the accession number NZ_AICW01000000. In this study, the genome features and the molecular phylogenetic tree of Act. iraqiensis IQ-H1are analyzed. The RAST tool was used for genome annotation. The genomic features were elucidated using QUAST tool. The circular genome map, and the core and pan-genome map of Act. iraqiensis IQ-H1 was generated using CGView and the GView tools respectively. The JSpeciesWS server was used for the tetranucleotide signature analysis and the REALPHY server was utilized for the construction of the whole genome sequence based phylogenetic tree. The genome size of the strain was around 4.0 Mpb and the number of contigs was 110 with a GC content of 70.46%. The core genome of Act. iraqiensis IQ-H1 was estimated to be 2.2 Mpb. Based on z-scores of the tetranucleotide signature analysis, Act. halophila DSM 43834, Act. mortivallis DSM 44261 and Act. saharensis DSM 45459 were the most relative strains to Act. iraqiensis IQ-H1with z-scores 0.99784, 0.98943 and 0.99789 respectively. Based on the phylogenetic tree constructed from the whole genome sequences, Act. iraqiensis IQ-H1 was the most closely related to Act. saharensis DSM 45459, Act. halophila DSM 43834 and Act. mortivallis DSM 44261. The results suggest that the web-based bioinformatics tools such as QUAST, CGView, GView, JSpeciesWS and REALPHY can be utilized for the analysis of the genomic features of Act. iraqiensis IQ-H1 and other species of the genus Actinopolyspora.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Natural-Convection Phenomenon from a Finned Heated Vertical Tube: Experimental Analysis
...Show More Authors

       In this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Choosing Appropriate Distribution ‏‎by Minitab’s 17 Software to Analysis System Reliability
...Show More Authors

This research aims to choose the appropriate  probability ‎ distribution  ‎‏‎ to the reliability‎        analysis‎ for  an   item through ‎ collected data for operating and stoppage  time of  the case  study.

    Appropriate choice for .probability distribution   is when  the data look to be on or  close the form fitting line for probability plot and test the data  for  goodness of fit .

     Minitab’s 17 software  was used ‎  for this  purpose after  arranging collected data and setting it in the the program‎.

 &nb

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Use Principal Component Analysis Technique to Dimensionality Reduction to Multi Source
...Show More Authors

This paper tackles with principal component analysis method (PCA ) to dimensionality reduction in the case of linear combinations to digital image processing and analysis. The PCA is statistical technique that shrinkages a multivariate data set consisting of inter-correlated variables into a data set consisting of variables that are uncorrelated linear combination, while ensuring the least possible loss of useful information. This method was applied to a group of satellite images of a certain area in the province of Basra, which represents the mouth of the Tigris and Euphrates rivers in the Shatt al-Arab in the province of Basra.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Optics & Laser Technology
Finite element thermal analysis for PMMA/st.st.304 laser direct joining
...Show More Authors

This work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par

... Show More
View Publication
Scopus (46)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Jun 29 2024
Journal Name
Journal Of Humanities And Social Sciences Researches
Measuring and Analysis the Relationship between the Internal Public Debt and the Exchange Rate in the Iraqi Economy for The Period 2004 – 2022
...Show More Authors

The scholastic view of public religion differed, and this difference was on two extremes. All economic schools agreed that public debt is a monetary liquidity that was unjustly deducted from the income and output cycle as a result of the imbalance in the economic balance and the departure from the conditions of balance between aggregate demand and aggregate supply. Debt is a waste of financial resources allocated to productive accumulation. Except for the Keynesian school, which considers public debt to be an addition to aggregate demand after the decline in the role of the private sector in investment as a result of pessimistic expectations that warn of signs of economic contraction. Public debt is linked to the ex

... Show More
Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
International Journal Of Special Education
Cultural Perspective of Male Outfit in the Text of the Play of Hamlet by William Shakespeare and the Application of (the Status of Apparels) Textual Analysis
...Show More Authors

Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
The role of e-Government on corruption and its impact on the financial performance of the government: An empirical analysis on the Iraqi government
...Show More Authors

This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance

Scopus (15)
Scopus