Preferred Language
Articles
/
BxeIN48BVTCNdQwCHGO-
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturbation mechanism of both crossover and mutation operators is designed based on the direct gene ontology annotations and Jaccard similarity coefficients for the proteins. The results on yeast Saccharomyces cerevisiae PPIN provide a useful perspective that the functional domain of the proteins, as compared with the topological domain, is more consistent with the true information reported in the Munich Information Center for Protein Sequence (MIPS) catalog. The evaluation at both complex and protein levels reveals that feeding the components of the EA with biological information will imply more accurate complex structures, whereas topological information may mislead the algorithm towards a faulty structure.

Scopus Crossref
Publication Date
Sun Jan 22 2023
Journal Name
Mesopotamian Journal Of Big Data
Parallel Machine Learning Algorithms
...Show More Authors

 To expedite the learning process, a group of algorithms known as parallel machine learning algorithmscan be executed simultaneously on several computers or processors. As data grows in both size andcomplexity, and as businesses seek efficient ways to mine that data for insights, algorithms like thesewill become increasingly crucial. Data parallelism, model parallelism, and hybrid techniques are justsome of the methods described in this article for speeding up machine learning algorithms. We alsocover the benefits and threats associated with parallel machine learning, such as data splitting,communication, and scalability. We compare how well various methods perform on a variety ofmachine learning tasks and datasets, and we talk abo

... Show More
View Publication
Scopus (23)
Crossref (16)
Scopus Crossref
Publication Date
Sat Mar 25 2023
Journal Name
Journal Of Biomechanical Science And Engineering
THE ASSOCIATION OF DAZ PROTEIN WITH AZOOSPERMIA IN IRAQI INFERTILE MEN
...Show More Authors

A disease of the reproductive system known as "infertility" is characterized by the inability to conceive after twelve months or more of sexual activity. This study was carried out to investigate the level of the DAZ protein in “Azoospermia” Iraqi patients. One hundred and fifty human blood samples were collected from different regions in Baghdad governorate include (private medicals Labs and “high institute for infertility diagnosis” assisted reproductive techniques and Kamal Al- Samara'ay IVF Hospital). The control group (fertile) consists of 50 males with an age range between 22-51 years old, while the patient (infertile group) consists of 100 sample males with ages ranging between 25-51 years old. The correlation of mean age for

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Nursing Education Scholarship
Validity and Reliability of the Arabic Version of the Incivility in Nursing Education-Revised Scale
...Show More Authors
Abstract<sec id="j_ijnes-2019-0074_s_001a_w2aab3b7c96b1b6b1aab1c14b1Aa"><title>Background

Incivility in nursing education can negatively affect the academic achievement. As there is no tool in Arabic to assess incivility among nursing students, there is a need for a valid and reliable tool.

Purpose

This study aimed to investigate the psychometric properties of the Arabic version of the Incivility in Nursing Education- Revised (INE-R) survey.

Method

Th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Topological Indices Polynomials of Domination David Derived Networks
...Show More Authors

The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Veterinary World
Comparison of the sequences of the viral capsid protein 1 and viral capsid protein 2 encoded genes in symptomatic and asymptomatic cases of canine parvovirus 2 in dogs
...Show More Authors

Background and Aim: Canine parvovirus 2 (CPV-2) is a highly contagious virus that infects wild and domestic canines. Despite the use of a routine vaccination protocol, it is endemic in Iraq. The genetic drift of CPV-2 is a major issue worldwide because it abrogates virus control. In Iraq, there is a knowledge gap regarding the genetic sequences of asymptomatic and symptomatic CPV-2 cases. Therefore, this study aimed to perform a genetic analysis of viral capsid protein 1 (VP1) and viral capsid protein 2 (VP2), two major capsid-encoding genes, to demonstrate the possible role of certain mutations in triggering infection. Materials and Methods: Symptomatic and asymptomatic cases (n = 100/each) were tested by a polymerase chain reacti

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 10 2025
Journal Name
Aip Conference Proceedings
Exploring generalizations of fibrewise micro-topological spaces and their applications in mathematics
...Show More Authors

Abstract. Fibrewise micro-topological spaces be a useful tool in various branches of mathematics. These mathematical objects are constructed by assigning a micro-topology to each fibre from a fibre bundle. The fibrewise micro-topological space is then formed by taking the direct limit of these individual micro-topological spaces. It can be adapted to analyze various mathematical structures, from algebraic geometry to differential equations. In this study, we delve into the generalizations of fibrewise micro-topological spaces and explore the applications of these abstract structures in different branches of mathematics. This study aims to define the fibrewise micro topological space through the generalizations that we use in this paper, whi

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Apr 05 2021
Journal Name
Solid State Technology
Genetic Algorithms in Construction Project Management: A Review
...Show More Authors

Genetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem

... Show More
View Publication Preview PDF