Preferred Language
Articles
/
fReIxJIBVTCNdQwCi78-
Loss of the Epigenetically Inactivated-X-Chromosome (Barr Body) a Potential Biomarker for Breast Cancer Development

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Proceedings Of The 10th International Joint Conference On Computational Intelligence
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun Dec 19 2021
Journal Name
Iraqi Journal Of Science
Geological Modeling for Yamama Formation in Abu Amood Oil Field

3D geological model of a simple petroleum reservoir for Yamama Formation has
been built in Abu Amood Oil Field using Petrel software, which is a product of
Schlumberger. This model contains the structure, stratigraphy and reservoir
properties (porosity and water saturation) in three directions(X, Y and Z).Geologic
modeling is an applied science of creating computerized representations of portions
of the earth's crust, especially oil and gas fields.
Yamama Formation in Abu Amood Oil Field is divided into thirteen zones by
using well logs and their petrophysical properties, six of which are reservoir zones.
From the top of the formation these six zones are: (YB-1, YB-2, YB-3, YC-1, YC-2
and YC-3). These reservoir

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Water Hammer Arresters; Review Studies and Practical Experiments for Alternatives

The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Signal Soft Sets for Atoms Modeling and Signal Soft Topology

In this paper we define a signal soft set as a mathematical tool to represent and study atoms, anti-atoms, electrons, anti-electrons, protons, and anti-protons, and generate a signal soft topology, with an example of signal soft topology on H2O.

Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Sequential feature selection for heart disease detection using random forest

Heart disease identification is one of the most challenging task that requires highly experienced cardiologists. However, in developing nations such as Ethiopia, there are a few cardiologists and heart disease detection is more challenging. As an alternative solution to cardiologist, this study proposed a more effective model for heart disease detection by employing random forest and sequential feature selection (SFS). SFS is an effective approach to improve the performance of random forest model on heart disease detection. SFS removes unrelated features in heart disease dataset that tends to mislead random forest model on heart disease detection. Thus, removing inappropriate and duplicate features from the training set with sequential f

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (2)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
View Publication