استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA
الحمد لله رب العالمين والصلاة والسلام على نبينا محمد صلى الله عليه وآله وصحبه وسلم اجمين.
وبعد..
فان موضوع هذا البحث هو (اسرار المبالغة في صيغ المفردات في معجم العين) ، وقد جعلت موضوع المبالغة في معجم العين ؛ لان كتاب العين يعد باكورة التأليف المعجمي عند العرب ، والطريقة التي فتقها الخليل بن احمد الفراهيدي في هذا المعجم عند العرب عُدت من اكبر المدارس المعجمية في مضمار التأليف ال
... Show Moreمن الضروري اجراء تحليل الحساسية للمشاريع الاستثمارية التي يتبناها القطاع العام أو الخاص وذلك لسببين ، الاول هو تضمين عامل المخاطرة واللاتاكد عند تقييم المشروع من الناحية الاقتصادية ، حيث لابد من يكون نسبة مخاطرة وعدم تاكد عند تقييم أي مشروع لمجابهة احداث المستقبل الغير متوقعة ، الثاني المنافسة الشديدة بين المنتجات المحلية والمستوردة ، حيث ان تحليل الحساسية يعطينا صورة عن مدى حساسية القيمة الحالية
... Show MoreThe purpose of this research is to suggest a model which may be used by law enforcement to broaden individual and organizational creativity while providing a more inclusive, holistic view of management within our internal and external organizational structures. This project introduces alternatives to traditional management, leadership styles and problem solving strategies. Law enforcement organizations in the 21st century will face many challenges. Much like community policing impacted the nation in the mid 1980's through the 1990's, the systems thinking approach offers a philosophy for the new millennium.
Most organizations will face many challenges in the next decade of the twentieth first century. Just
... Show MoreThe inelastic C2 form factors and the charge density distribution (CDD) for 58,60,62Ni and 64,66,68Zn nuclei has been investigated by employing the Skyrme-Hartree-Fock method with (Sk35-Skzs*) parametrization. The inelastic C2 form factor is calculated by using the shape of Tassie and Bohr-Mottelson models with appropriate proton and neutron effective charges to account for the core-polarization effects contribution. The comparison of the predicted theoretical values was conducted with the available measured data for C2 and CDD form factors and showed very good agreement.
GIS is characterized by great potentialeties to deal with huge geographical data and conclude what is necessary for it. It was very useful to get use of the potentialities of this system of GIS in the field of archaeology and to harvest very accurate results in a relatively short time, compared to the old archaeological methods.
For a long time, the intensification of profit represented a major goal for the company management ,but this goal confirmed a series of restrictions such the constriction on short period, the time rather than on long and medium strategic goal, the relationships with customers ,the supplies, employees , This goal is replaced by another one (intensification of the company's value) ,and the fortune of the share holders itself ,for the purpose of creating value, the company must generate great outcomes to cover the operating expense and to insure the a suitable compensation to the invested capital (the market value added) is the indication used to estimate the company ability to create value –added the development
... Show MoreKnowing the conduct of the common stocks during the different intervals of time (quarterly and yearly) is an important step in choosing and administrating the portfolio of common stocks which be in accordance with the tendency of the investor toward risk and revenues. This is an attempt to understand the behavior of this common stocks in Amman stock Exchange to discover the extent of change in its behavior for employing them by the managers in identifying the accurate and beneficed investments , which meet the ambitions of Arab investor.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe flavonoglycone hesperidin is recognized as a potent anti-inflammatory, anticancer, and antioxidant agent. However, its poor bioavailability is a crucial bottleneck regarding its therapeutic activity. Gold nanoparticles are widely used in drug delivery because of its unique properties that differ from bulk metal. Hesperidin loaded gold nanoparticles were successfully prepared to enhance its stability and bioactive potential, as well as to minimize the problems associated with its absorption. The free radical scavenging activities of hesperidin, gold nanoparticles, and hesperidin loaded gold nanoparticles were compared with that of Vitamin C and subsequently evaluated in vitro using 2,2-diphenyl-1-picrylhydrazyl assay. The antioxi
... Show More