Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering. The extraction of features gave a high distinguishability and helped GA reach the solution more accurately and faster.
Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreToday’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol
... Show MoreIn the lifetime process in some systems, most data cannot belong to one single population. In fact, it can represent several subpopulations. In such a case, the known distribution cannot be used to model data. Instead, a mixture of distribution is used to modulate the data and classify them into several subgroups. The mixture of Rayleigh distribution is best to be used with the lifetime process. This paper aims to infer model parameters by the expectation-maximization (EM) algorithm through the maximum likelihood function. The technique is applied to simulated data by following several scenarios. The accuracy of estimation has been examined by the average mean square error (AMSE) and the average classification success rate (ACSR). T
... Show MoreThe issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreIn gene regulation, transcription factors (TFs) play a key function. It transmits genetic information from DNA to messenger RNA during the process of DNA transcription. During this step, the transcription factor binds to a segment of the DNA sequence known as Transcription Factor Binding Sites (TFBS). The goal of this study is to build a model that predicts whether or not a DNA binding site attaches to a certain transcription factor (TF). TFs are regulatory molecules that bind to particular sequence motifs in the gene to induce or restrict targeted gene transcription. Two classification methods will be used, which are support vector machine (SVM) and kernel logistic regression (KLR). Moreover, the KLR algorithm depends on another regress
... Show MoreBackground: Normal occlusal features of primary dentition are crucial for normal development of the permanent dentition. Breastfeeding is an important factor for both general and dental health of children. Aim: The aim of the present study is to assess the impact of the breastfeeding duration on the prevalence of normal occlusal features of the primary dentition among preschool children in Baghdad. Materials and Methods: The sample was 630 Iraqi children (270- boys, 360 girls), aged 3-5 years selected from four kindergartens in Baghdad city. The study was carried out through questionnaire and clinical examination. Normal occlusal features were examined as the presence or absence of interincisive spaces (IS) and primate spaces (PS), termi
... Show MoreCarbon nanoparticles (CNPs) formed by one-step laser ablation in deionized water were carefully studied. Scanning electron microscopy, atomic force microscopy, Raman spectroscopy, and UV–V spectroscopy were used to obtain morphological, chemical, and optical properties of CNPs. SEM outcomes established that the synthesized nanoparticles are semi-spherical with a wide particle size distribution. Raman investigation showed two typical and expected peaks ~ (1300 - 2700) cm−1, which are confirming to transverse and longitudinal modes of the carbon structure. The absorption spectra proved that the intensity of spectra increases as particle size and concentration increase.
This study was undertaken to introduce a fast, accurate, selective, simple and environment-friendly colorimetric method to determine iron (II) concentration in different lipstick brands imported or manufactured locally in Baghdad, Iraq. The samples were collected from 500-Iraqi dinars stores to establish routine tests using the spectrophotometric method and compared with a new microfluidic paper-based analytical device (µPAD) platform as an alternative to cost-effective conventional instrumentation such as Atomic Absorption Spectroscopy (AAS). This method depends on the reaction between iron (II) with iron(II) selective chelator 1, 10-phenanthroline(phen) in the presence of reducing agent hydroxylamine (HOA) and sodium acetate (NaOAc) b
... Show More