Preferred Language
Articles
/
9hjNRZQBVTCNdQwCUQN5
A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Statistics And Its Interface
Search for risk haplotype segments with GWAS data by use of finite mixture models
...Show More Authors

The region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sat May 05 2018
Journal Name
College Of Education For Pure Science Ibn-a L-haitham, University Of Baghdad
On Some New Topological Spaces
...Show More Authors

Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Engineering And Sustainable Development
NEW TRENDS FOR ANGLE OF ARRIVAL ESTIMATION
...Show More Authors

View Publication
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Al-kindy College Medical Journal
Contraception as a Risk Factor of Trichomonas vaginalis Infection Among Women Attending Outpatient of Al-Batool Teaching Hospital for Maternity and Children-Baqubah-Iraq
...Show More Authors

Background:The effects of contraception on Trichomonas vaginalis have important implications for women who suffer from infections associated with disruptions in the vaginal ecology, such as bacterial vaginitis and urinary tract infections.

Objective: To find the association of the common types of contraceptions with the Trichomonasvaginalis infection in women admitted to the Al-BatoolTeaching Hospital for Maternity and Children in Baqubah city.

Type of study: Cross-sectional study

Methods: This study consist of 75 women with contraception use and71 apparently healthy non contraception user women  admitted to outpatient in Al

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 15 2022
Journal Name
Al-kindy College Medical Journal
Assessment of Nurses’ Knowledge, Attitude, and Practices on Antibiotic Use and Resistance in Baghdad: A single-hospital study
...Show More Authors

Background: There are so many evidences that there was antimicrobial resistance, and there were many strains that emerged which were difficult to treat. We are living in a situation that the dissemination of multiple drug resistant bacteria can lead us to the situation, in which no treatment could be offered for bacterial infection in future.

Aim of study: Assessment of nurses’ knowledge, attitude, and practices on antibiotic use and resistance in Fatima Al Zahra hospital in Baghdad.

Subjects and Methods:  A cross-sectional study. The study was carried on from 1st of February to 31st of March 2021.  A questionnaire was constructed by the research team based on literature review and was adapted to asses

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Quality of Life for Parents of Autistic Child
...Show More Authors

Objectives: The study aims to assess the QOL for parents of a child with autism Methodology: A descriptive study was conducted on parents of autistic child in Baghdad city. A purposive (non-probability) sample of (156) parents, (78) mothers and (78) fathers of (78) autistic children who are clients and receive care in the private specialization centers for autism were selected to participated in the current study. The study used a self- administrative questionnaire for data collection. Results: The findings indicated that both parents (mothers and fathers) were participated in this study, and they comprised

... Show More
View Publication Preview PDF