Preferred Language
Articles
/
ExeQN48BVTCNdQwCB2Me
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems
...Show More Authors

      Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated under four expressions depending on the type of gene sub-ontology. To demonstrate the performance of the proposed evolutionary based complex detection algorithm, the Saccharomyces Cerevisiae (yeast) PPI network is used in the evaluation. The results reveal that the proposed algorithm achieves more accurate complex structures than the counterpart heuristic algorithms and the canonical evolutionary algorithm based on the topological-aware mutation operator.

Scopus Crossref
Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
Evaluating the Performance of High Modulus Asphalt Concrete Mixture for Base Course in Iraq
...Show More Authors

In the 1980s, the French Administration Roads LCPC developed high modulus mixtures (EME) by using hard binder. This type of mixture presented good resistance to moisture damage and improved . mechanical properties for asphalt mixtures including high modulus, good fatigue behaviour and excellent resistance to rutting. In Iraq, this type of mixture has not been used yet. The main objective of this research is to evaluate the performance of high modulus mixtures and comparing them with the conventional mixture, to achieve this objective, asphalt concrete mixes were prepared and then tested to evaluate their engineering properties which include moisture damage, resilient modulus, permanent deformation and fatigue characteristics. These prope

... Show More
View Publication Preview PDF
Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
Evaluating the Performance of High Modulus Asphalt Concrete Mixture for Base Course in Iraq
...Show More Authors

In the 1980s, the French Administration Roads LCPC developed high modulus mixtures (EME) by using hard binder. This type of mixture presented good resistance to moisture damage and improved mechanical properties for asphalt mixtures including high modulus, good fatigue behaviour and excellent resistance to rutting. In Iraq, this type of mixture has not been used yet. The main objective of this research is to evaluate the performance of high modulus mixtures and comparing them with the conventional mixture, to achieve this objective, asphalt concrete mixes were prepared and then tested to evaluate their engineering properties which include moisture damage, resilient modulus, permanent deformation and fatigue characteristics. These pro

... Show More
Publication Date
Thu Mar 16 2017
Journal Name
Journal Of Translation Studies
Problems of Translating Computer Collocations
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Electrical Engineering
A Study of the Influence of Steel Brushes in Rail Surface Magnetic Flux Leakage Detection Using Finite Elements Simulation
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Growth of Solutions of Nonhomogeneous Higher order Complex Linear Differential Equations
...Show More Authors

The nonhomogeneous higher order linear complex differential equation (HOLCDE) with meromorphic (or entire) functions is considered in this paper. The results are obtained by putting some conditions on the coefficients to prove that the hyper order of any nonzero solution of this equation equals the order of one of its coefficients in case the coefficients are meromorphic functions. In this case, the conditions were put are that the lower order of one of the coefficients dominates the maximum of the convergence exponent of the zeros sequence of it, the lower order of both of the other coefficients and the nonhomogeneous part and that the solution has infinite order. Whiles in case the coefficients are entire functions, any nonzero solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A New Approach of Morgan-Voyce Polynomial to Solve Three Point Boundary Value Problems
...Show More Authors

In this paper, a new procedure is introduced to estimate the solution for the three-point boundary value problem which is instituted on the use of Morgan-Voyce polynomial. In the beginning, Morgan-Voyce polynomial along with their important properties is introduced. Next, this polynomial with aid of the collocation method utilized to modify the differential equation with boundary conditions to the algebraic system. Finally, the examples approve the validity and accuracy of the proposed method.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Employing electronic supervision applications in developing the teaching performance of teachers in the Sultanate of Oman: a suggested vision
...Show More Authors

The study aimed to investigate the employment of electronic supervision applications in developing the teaching performance of teachers in Oman. Based on the qualitative method and the study population consisted of all the teachers of the first cycle in the Governorate of Muscat. The study sample amounted to 24 female teachers. The interview was used as a tool for data collection. The study reached several results, including: There are difficulties in employing electronic supervision applications, which are weak network, density of curricula, lack of experience in applying technology, and the large number of tasks assigned to the teacher. These difficulties can also be overcome by strengthening the network, training teachers, reducing th

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2021
Journal Name
Journal Of Engineering Science And Technology
INVESTIGATING THE EFFECT OF INLET APERTURE AND BAFFLE POSITION IN IMPROVING THE EFFICIENCY OF PRIMARY SETTLING TANKS
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref