Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algorithms have been implemented to unfold the structures of communities, the influence of NMI on the Q, and vice versa, between a detected partition and the correct partition in signed and unsigned networks is unclear. For this reason, in this paper, we investigate the correlation between Q and NMI in signed and unsigned networks. The results show that there is no direct relationship between Q and NMI in both types of networks.
By measuring Adropin, fasting blood glucose (FBG), cholesterol, high-density lipoprotein (HDL), triglycerides (TG), low-density lipoprotein (LDL), and very low-density lipoprotein (VLDL) in the sera of Iraqi patients with MetS and type 2 diabetes mellitus (T2DM), the current study was designed to compare some crucial markers in metabolic syndrome (MetS) sera and diabetic patients (T2DM) with control. Twenty female subjects were divided into three groups: group I=40 with MetS and group II=40 with T2DM, and 40 healthy subjects were employed as a control group. Compared to the control group, Adropin levels in the Mets group and T2DM group decreased significantly (p < 0.05). In contrast, none of the patient groups (MetS and T2DM)
... Show More-
The subject of this research is the study of the formal alienation of contemporary English sculpture, by comparing the most important sculptors of the new contemporary generation. This research problem is to look for the important factors in the formation of the contemporary sculptural structure of the exotic, and what is the mechanism of formation and output of these forms. The research seeks to explore (Alienation in contemporary sculpture between the works of Anthony Caro and Tony Cragg) in a comparative study. The importance of the research is to identify the concept of alien forms in contemporary British sculpture, especially in the cases of Anthony Caro and Tony Cragg that this research is considered a know
<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThere are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
Erythrocytes aggregation is an important physiological phenomenon in the circulation of blood, and is a basic characteristic of normal blood that plays a major role in cardiovascular system especially in the microcirculation. Blood samples have been taken from (30) volunteers (15 male, and 15 female), their ages (20-30) years. The Erythrocytes Sedimentation Rate (ESR) for those subjects was measured at different Packed Cells Volume (PCV) (10%-25%), and also it was measured at different temperature (10oC-25oC). The results show that there was a highly significant decrease (P<0.01) in ESR when the PCV increase and a highly significant increase (P<0.01) in ESR when the temperatures increase. The conclusion from these results is that the ESR va
... Show MoreFor over a decade, educational technology has been used sparingly in our schools and universities. Online training courses have been used since 2003 to fill the gaps in our learning system and to add extra program besides classroom learning. This paper aims to investigate the Iraqi EFL instructors’ participating in online training courses and its influence on the process of teaching and learning.
The sample of present study consists of 30 instructors from University of Baghdad. The questionnaire of sixteen items was constructed. After ensuring validity and reliability of questionnaire, it was applied on March 2013 and the result shows that most of instructors improve their teaching methods b
... Show MorePurpose: to demonstrate the possibility of moving to electronic data exchange dimensions (regulatory requirements, technical requirements, human requirements, senior management support) to simplify the work procedures dimensions (modern procedures, clarity of procedures, short procedures, availability of information and means required. The simplicity of the models used because of its importance to keep abreast of recent developments in the service of municipal works through the application of electronic data interchange, which simplifies procedures and out of the routine in the performance of the work of municipal departments has developed. It was applied to Municipality (Hilla) so that the transformation
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Water flooding is one of the most important methods used in enhanced production; it was a pioneer method in use, but the development of technology within the oil industry, takes this subject toward another form in the oil production and application in oil fields with all types of oils and oil reservoirs. Now days most of the injection wells directed from the vertical to re-entry of full horizontal wells in order to get full of horizontal wells advantages.
This paper describes the potential benefits for using of re-entry horizontal injection wells as well as combination of re –entry horizontal injection and production wells. Al Qurainat productive sector was selected for study, which is one of the four main productive sectors of Sout