Preferred Language
Articles
/
BxeIN48BVTCNdQwCHGO-
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturbation mechanism of both crossover and mutation operators is designed based on the direct gene ontology annotations and Jaccard similarity coefficients for the proteins. The results on yeast Saccharomyces cerevisiae PPIN provide a useful perspective that the functional domain of the proteins, as compared with the topological domain, is more consistent with the true information reported in the Munich Information Center for Protein Sequence (MIPS) catalog. The evaluation at both complex and protein levels reveals that feeding the components of the EA with biological information will imply more accurate complex structures, whereas topological information may mislead the algorithm towards a faulty structure.

Scopus Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Coronary Angiographic Findings in Diabetic Patients Versus non-Diabetics with Coronary Heart Disease
...Show More Authors

Background :Atherosclerosis is the most
frequent underlying cause of ischemic heart
disease and a major cause of death all over the
world. This study was carried out to analyze and
compare the angiographic findings in patients
with diabetes mellitus versus non diabetics with
coronary heart disease , and to correlate these
findings with some risk factors for coronary
heart disease.
Methods: A total of 100 patients were studied,
50 with diabetes mellitus, and 50 non diabetics.
This study was carried out at Al-Sadr teaching
hospital in Basrah, Southern Iraq during the
period April 2009- September 2009. All patients
were known to have coronary heart disease. Risk
factors for coronary heart disease

... Show More
View Publication
Publication Date
Wed Oct 10 2018
Journal Name
Al-kindy College Medical Journal
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 14 2025
Journal Name
Rafidain Journal Of Science
Opportunism Versus True Pathogenicity in Staphylococcus Epidermidis is an Ongoing Dilemma Areview Article
...Show More Authors

View Publication
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Development of a Semi-Analytical Type Curve of Transient Pressure Response in Complex Well-Reservoir Architectures
...Show More Authors

The objective of the conventional well testing technique is to evaluate well- reservoir interaction through determining the flow capacity and well potential on a short-term basis by relying on the transient pressure response methodology. The well testing analysis is a major input to the reservoir simulation model to validate the near wellbore characteristics and update the variables that are normally function of time such as skin, permeability and productivity multipliers.

Well test analysis models are normally built on analytical approaches with fundamental physical of homogenous media with line source solution. Many developments in the last decade were made to increase the resolution of transient response derivation to meet the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Therapeutic efficacy of protein compound extraction fromMetapenaeusaffinisagainst glucosamine sulphate-induced nephrotoxicity in male rats
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Biochemical And Cellular Archives
Expression of ebv latent membrane protein 1 (LMP1) in Iraqi women with cervical carcinoma
...Show More Authors

The design of this paper is to find the possible correlation of Epstein Barr virus infection ina group of Iraqi women with cervical carcinoma though detection of Latent Membrane Protein 1 (LMP1) in these cervical tissues. Paraffinized blocks of two groups were included. The first sample of 30 cervical carcinomatous tissues and 15 biopsies from an apparently normal cervical tissues. All the samples were sectioned on a positive charged slides with 4 mm – thickness then submitted for immunohistochemical (IHC) staining to detect viral LMP1 expression. Sixty three percentage (19 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant ass

... Show More
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of The Faculty Of Medicine-baghdad
CA-125, plasma fibrinogen and C-reactive protein in correlation with severity of preeclampsia.
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Measuring of C-reactive protein titer in patients with acute hepatitis-C Virus infection
...Show More Authors

Objective(s): To measure serum C-reactive protein (CRP) titer as a predictive diagnosis of acute hepatitis C virus (HCV)
infection.
Methodology: Two hundred and ten patients with acute HCV infection and 234 apparently healthy individuals as
control group were enrolled in this study in Baghdad medical city (Teaching Laboratories). The patents include
74(35.2%) females and 136 (64.8%) males with mean age (27±16.5) years. The control group includes 114 (48.7%)
females and 120 (51.3%) males with mean age (26±5.8) years. Blood samples were collected from out patients from
Alfadul in Baghdad city. Sera were separated and stored at 20 0
C. The diagnosis of acute HCV infection was based on
detection of HC Ag and anti- H

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref