Preferred Language
Articles
/
6xiGW5QBVTCNdQwCjhKg
Design and analysis of a high sensitivity open microchannel PCF-based surface plasmon resonance refractometric sensor
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
ZnO nanostructures as low concentration NO2 gas sensor and impact the temperature on sensing properties
...Show More Authors

Zinc oxide (ZnO) nanostructures were synthesized through the hydrothermal method at various conditions growth times (6,7 and 8 hrs.) and a growth temperature (70, 90, and 100 ºC). The prepared ZnO nanostructure samples were described using scanning electron microscopy (SEM) and X-ray diffractometer to distinguish their surface morphologies and crystal structures. The ZnO samples were confirmed to have the same crystal type, with different densities and dimensions (diameter and length). The obtained ZnO nanostructures were used to manufacture gas sensors for NO2 gas detection. Sensing characteristics for the fabricated sensor to NO2 gas were examined at different operating temperatures (180, 200, 220, and 240) ºC with a low gas concentrati

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
A New Green Approach of CFIA Technique for Direct Assay with a High Throughput of Sulfamethoxazole Drugs Using Condensation Reaction with NQS Agent
...Show More Authors

A new design of manifold flow injection (FI) coupling with a merging zone technique was studied for sulfamethoxazole determination spectrophotometrically. The semiautomated FI method has many advantages such as being fast, simple, highly accurate, economical with high throughput . The suggested method based on the production of the orange- colored compound of SMZ with (NQS)1,2-Naphthoquinone-4-Sulphonic acid Sodium salt in alkaline media NaOH at λmax 496nm.The linearity range of sulfamethoxazole was  3-100  μg. mL-1, with (LOD) was 0.593 μg. mL-1 and the RSD% is about 1.25 and the recovery is 100.73%. All various physical and chemical parameters that have an effect on the stability and development of

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref