Preferred Language
Articles
/
BxeIN48BVTCNdQwCHGO-
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturbation mechanism of both crossover and mutation operators is designed based on the direct gene ontology annotations and Jaccard similarity coefficients for the proteins. The results on yeast Saccharomyces cerevisiae PPIN provide a useful perspective that the functional domain of the proteins, as compared with the topological domain, is more consistent with the true information reported in the Munich Information Center for Protein Sequence (MIPS) catalog. The evaluation at both complex and protein levels reveals that feeding the components of the EA with biological information will imply more accurate complex structures, whereas topological information may mislead the algorithm towards a faulty structure.

Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Biomedical & Pharmacology Journal
Diode Laser Versus Scalpel Gingivectomy
...Show More Authors

Different methods can be used to remove tissue during gingivectomy and produce a good gingival margin, the most common is the conventional gingivectomy which is done by the use of scalpel, now a day’s Laser is widely spread and can be used to perform surgeries. Materials and methods: 50 patients divided into two equal groups, Group 1 gingivectomy was done by Diode Laser, Group 2 gingivectomy was done by scalpel, plaque and gingival index were measured at 1st, 2nd and 3rd visit, swab were taken and sent foe detecting bacterial growth and biopsy were taken for histopathological examination. Group 1 show no significant differences in plaque and gingival means between the visits, the bacteriological examination showed no growth of bact

... Show More
Publication Date
Mon Dec 25 2017
Journal Name
Biomedical And Pharmacology Journal
Diode Laser Versus Scalpel Gingivectomy
...Show More Authors

Background: different methods can be used to remove tissue during gingivectomy and produce a good gingival margin, the most common is the conventional gingivectomy which is done by the use of scalpel, now a day’s Laser is widely spread and can be used to perform surgeries. Materials and methods: 50 patients divided into two equal groups, Group 1 gingivectomy was done by Diode Laser, Group 2 gingivectomy was done by scalpel, plaque and gingival index were measured at 1st, 2nd and 3rd visit, swab were taken and sent foe detecting bacterial growth and biopsy were taken for histopathological examination. Group 1 show no significant differences in plaque and gingival means between the visits, the bacteriological examination showed no growth of

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Dec 09 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Effect of Sodium sulfite treatment on the trypsin inhibitors activity, protein isolate and protein solubility of complete and dehulling white bean seeds Phaseolus vulgaris.: Effect of Sodium sulfite treatment on the trypsin inhibitors activity, protein isolate and protein solubility of complete and dehulling white bean seeds Phaseolus vulgaris.
...Show More Authors

The study aimed to increase the biological value of white bean. The effect of different concentrations 0.01 ,0.02,0.03,and 0.04 M of sodium sulfite solutions for 1hr at 70 ºC on the trypsin inhibitors activity, protein isolate and protein solubility of complete and dehulling white bean flour were studied.Trypsin inhibitors activity were reduced by 42.97, 58.69, 68.59 and 69.58% in complete white bean flour at 0.01 ,0.02, 0.03, 0.04 M respectively, while the corresponding values were 50.43, 61.00, 75.61 and 85.66% respectively in dehulling white bean flour .Protein isolate value was 13.41% and protein solubility was 2.2% in control sample, Furthermore, the using of chemical treatment showed that protein isolate was reduced gradually and

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Epidemiological Complex Networks: A Survey
...Show More Authors

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc

... Show More
Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref