Preferred Language
Articles
/
SBe_NY8BVTCNdQwCOWIB
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including several CEC 2005 test problems and it shows reliability in most of the test cases.

Scopus Crossref
View Publication
Publication Date
Tue Oct 04 2022
Journal Name
Caspian Journal Of Environmental Sciences
Detecting genetics of several isolated bacterial species from soils by hydrocarbons
...Show More Authors

The presence of hydrocarbons in the soil is considered one of the main problems of pollution. In our current study, eight samples isolated from soil saturated with hydrocarbons were taken from different areas of Baghdad, Iraq. In this study, 5 isolates belonging to Pseudomonas aeruginosa by 99%, 4 isolates to Klebsiella pneumoniae by 98%, and 3 isolates to Enterobacter hormaechei by 97% were diagnosed in different ways. A molecular examination was also conducted by 16sRNA. We recorded P. aeruginosa, K. Pneumoniae and E. hormaechei as new local isolates in NCBI. In addition, a comparison was made between our isolates and the global isolates to determine the degree of convergence in the evolutionary line. The genes alkB and nahAc7 were diagno

... Show More
Scopus (4)
Scopus
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
The origin of bacterial contamination in AL-Habania reservoir in Iraq
...Show More Authors

Bacterial contamination of AL-Habania reservoir was studied during the period from February 2005 to January 2006; samples were collected from four stations (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir). Coliform bacteria, faecal Coliforms, Streptococci, and faecal Streptococci were used as parameters of bacterial contamination in waters through calculating the most probable number. Highest count of Coliform bacteria (1500 cell/100ml) was recorded at AL-Razaza during August, and the lowest count was less than (300 cell/100ml) in the rest of the collection stations for all months. Fecal Coliform bacteria ranged between less than 300 cells/100ml in all stations for all months to 700 c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Biochemical & Cellular Archives,
BACTERIAL CONTAMINATION OF IRAQI BANKNOTES CURRENCY IN CIRCULATION IN BAGHDAD CITY
...Show More Authors

The present study was identified the type of bacterial contamination of Iraqi banknotes currency (Iraqi dinars) in circulation. 68 Iraqi banknotes currency of different denominations samples were randomly gathered from different locations and different occupational groups in Baghdad city. The results showed 61 (89.70%) of the samples were determined to be contaminated with bacteria, whereas 7 (10.29%) were confirmed to be sterile. A total of 11 different species of bacteria resulting in 72 isolates were found from those 61 contaminated Iraqi banknotes currency. Based on culture, morphological and biochemical tests, 11 isolates were identified as Bacillus sp., Staphylococcus aureus, Staphylococcus epidermidis, Corynebacterium diphtheria, Leu

... Show More
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Current and Modified Flood Discharge Capacity of a Reach of Tigris River between Kut and Amarah Barrages
...Show More Authors

This study was conducted to examine the discharge capacity of the reach of the Tigris River between Kut and Amarah Barrages of 250km in length. The examination includes simulation the current capacity of the reach by using HEC-RAS model. 247cross sections surveyed in 2012 were used in the simulation. The model was calibrated using observed discharges of 533, 800, 1025 and 3000m3/s discharged at Kut Barrage during 2013, 1995, 1995 and 1988, respectively, and its related water level at three gauge stations located along the reach. The result of calibration process indicated that the lowest Root Mean Square Error of 0.095 can be obtained when using Manning’s n coefficient of 0.026, 0.03 for th

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
A New Model Design for Combating COVID -19 Pandemic Based on SVM and CNN Approaches
...Show More Authors

       In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from      Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
Journal Of Legal Sciences
Compensation for Psychological Damage Caused by Negligence - A Comparative Study
...Show More Authors

Psychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the

... Show More
View Publication
Publication Date
Thu Aug 08 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Novel Technique for Alveolar Ridge Expansion: A Comparative Clinical Study
...Show More Authors

Background: Piezosurgery improved the split approach by making it safer, easier, and less prone to complications when treating extremely atrophic crests. Densah drills, with their unique design, expand the ridge by densifying bone in a reverse, non-cutting mode. Objective: To assess the effectiveness of sagittal piezosurgery, which involves cutting bone to the full implant depth and then expanding it using osseodensification drills. We use this technique to expand narrow alveolar bones and simultaneously place dental implants in the maxillary and mandibular arches. Methods: Fourteen patients received 31 dental implants. The maxillary arch received 19, and the mandible received 12 dental implants. This study will include patients who

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
Comparative biosimilar quality studies between a rituximab product and MabThera
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref