Preferred Language
Articles
/
BxeIN48BVTCNdQwCHGO-
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturbation mechanism of both crossover and mutation operators is designed based on the direct gene ontology annotations and Jaccard similarity coefficients for the proteins. The results on yeast Saccharomyces cerevisiae PPIN provide a useful perspective that the functional domain of the proteins, as compared with the topological domain, is more consistent with the true information reported in the Munich Information Center for Protein Sequence (MIPS) catalog. The evaluation at both complex and protein levels reveals that feeding the components of the EA with biological information will imply more accurate complex structures, whereas topological information may mislead the algorithm towards a faulty structure.

Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of The Saudi Society Of Dermatology & Dermatologic Surgery
Pityriasis alba versus vitiligo
...Show More Authors

KE Sharquie, AA Noaimi, HM Salmo, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2013 - Cited by 5

View Publication
Publication Date
Sat Dec 31 2022
Journal Name
Mathematical Modelling Of Engineering Problems
Investigation of Energy Efficient Clustering Algorithms in WSNs: A Review
...Show More Authors

In recent years, Wireless Sensor Networks (WSNs) are attracting more attention in many fields as they are extensively used in a wide range of applications, such as environment monitoring, the Internet of Things, industrial operation control, electric distribution, and the oil industry. One of the major concerns in these networks is the limited energy sources. Clustering and routing algorithms represent one of the critical issues that directly contribute to power consumption in WSNs. Therefore, optimization techniques and routing protocols for such networks have to be studied and developed. This paper focuses on the most recent studies and algorithms that handle energy-efficiency clustering and routing in WSNs. In addition, the prime

... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Expression of Recombinant Human Glucocerebrosidase Protein in Sunflowers
...Show More Authors

Molecular farming has become one of the most significant implementations of modern biotechnology to generate modified plant crops to produce medicinal proteins. Agrobacterium is one plant genetic engineering tool that integrates genes of interest inside a host plant.  In recent years, the need to produce recombinant proteins as therapeutics has growing rapidly, and human glucocerebrosidase is one of the proteins that is need to treat disease. In this study, specific primers were designed to amplify Hu-GBA1 gene from constructed pGEM-GBA plasmid which was cloned into the plant expression vector pCAMBIA1304. The generated recombinant pCAMBIA1304-GBA plasmid was used to transform A. tumefaciens LBA4404

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Laparoscopic versus open appendectomy in patients with acuteappendicitis
...Show More Authors

Background: Laparoscopic surgery for
appendicitis is now a well established and
advanced method of performing general surgical
procedures.
Objectives: To compare the outcome of
laparoscopic and open appendectomies in terms
of operative time, analgesic requirement,
postoperative complications, hospital stay, return
to normal activity and condition of scar.
Methods: This prospective study was carried
out from 1stMay 2008-1st January 2010, involving
110 patients (45 male and 65 female) with
features suggestive of acute appendicitis were
divided into 45 patients laparoscopic
appendectomy (LA) group and 65 patients open
appendectomy (OA) group, after taking informed
consent. LA was done with the

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Primary repair versus diversion in penetrating colon injuries
...Show More Authors

Back ground: In Iraq, after 2003 had more
accidents of the shell, bullet and stab abdominal
wounds, more over colon injuries.
Objective: The aim of this study is to evaluate
the most appropriate management of penetrating
colon injuries, comparing the primary repair with
the diversion.
Methods: Eighty patient series with shell, bullet
and stab colonic injuries during 4.5 years period
from June 2006-december 2010 at Al-Yarmouk
teaching hospital. The study compared the use of
primary repair versus diversion, analyzing
variables such as sex, age, severity of injury and
mortality rate.
Results: there were total 80 patients ,62 (77.5%)
male and 18(22.5%) female .male :female ratio
3.4:1. the most

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Parallel Computing for Sorting Algorithms
...Show More Authors

The expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 15 2024
Journal Name
Iraqi Journal Of Laser
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca

... Show More
View Publication
Crossref (6)
Crossref