Preferred Language
Articles
/
Nxe8NI8BVTCNdQwC4GHE
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems

      Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated und

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems

      Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Scopus (3)
Scopus Crossref
View Publication
Publication Date
Wed Mar 15 2023
Journal Name
International Journal Of Advances In Intelligent Informatics
An automatic lip reading for short sentences using deep learning nets

One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jone

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Iraqi Journal Of Laser
Reconstruction of 3D Shape for an Object using Laser Scanning Triangulation

This paper presents a method of designing and constructing a system capable of acquiring
the third dimension and reconstructs a 3D shape for an object from multi images of that object using
the principle of active optical triangulation. The system consists of an illumination source, a photo
detector, a movement mechanism and a PC, which is working as a controlling unit for the hard ware
components and as an image processing unit for the object multi view raw images which must be
processed to extract the third dimension. The result showed that the optical triangulation method
provides a rapid mean for obtaining accurate and quantitative distance measurements. The final
result's analysis refers to the necessity of usin

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Scopus (3)
Scopus
Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Ieee Transactions On Neural Systems And Rehabilitation Engineering
Scopus (130)
Crossref (127)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Detection of JAK2V617F tyrosine kinase mutation and estimation of serum erythropoietin in blood donors who have high hematocrit

Background: JAK2V617F mutation is the most prevalent molecular abnormality in myeloproliferative neoplasms (MPNs) and has become a valuable marker for diagnosis of MPNs. Almost all patients with polycythemia vera (PV) have this acquired mutation. However, it has also been found in many other hematological diseases, and some studies even detected the presence of JAK2V617F in normal blood samples.
Objectives: To discuss the actual need to defer blood donors with high hematocrit.
Patients and methods: This prospective case control study was started on 16th of December 2012 and completed on 8th of July 2013, and enrolled 94 male blood donors who attended the National Blood Transfusion Center (NBTC) in Bagh

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
Scopus (13)
Crossref (9)
Scopus Crossref
View Publication