Preferred Language
Articles
/
ihYYv4sBVTCNdQwCM9q8
Finite State Automata Generator for DNA Motif Template as Preparation Step for Motif Mining

There are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif templates and offers novel algorithm to accomplish this. It is tested using many simple and compound motif templates of different sizes and various numbers of gaps that have unlimited ranges of intervals. The motifs sizes are up to 2M Bases. The motif templates include up to 2000 gaps and the interval of a gap is [1,100] up to [1, 1000000]. All of these cases were processed successfully.

Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Proposed Approach for Analysing General Hygiene Information Using Various Data Mining Algorithms

General medical fields and computer science usually conjugate together to produce impressive results in both fields using applications, programs and algorithms provided by Data mining field. The present research's title contains the term hygiene which may be described as the principle of maintaining cleanliness of the external body. Whilst the environmental hygienic hazards can present themselves in various media shapes e.g. air, water, soil…etc. The influence they can exert on our health is very complex and may be modulated by our genetic makeup, psychological factors and by our perceptions of the risks that they present. Our main concern in this research is not to improve general health, rather than to propose a data mining approach

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Silver Nanoflowers as an Interfacial Liquid-State Surface Enhanced Raman Spectroscopy (SERS) Sensor for Water Pollution

Water pollution has created a critical threat to the environment.‎‎ A lot of research has been done ‎recently to use surface-enhanced Raman spectroscopy (SERS) to detect multiple pollutants in water. This study aims to use Ag colloid nanoflowers as liquid SERS enhancer. Tri sodium phosphate (Na3PO4) was investigated as a pollutant using liquid SERS ‎based on colloidal Ag ‎nanoflowers. The chemical method was used to synthesize nanoflowers from silver ‎ions. Atomic Force Microscope (AFM), Scanning Electron Microscope (SEM), and X-ray diffractometer (XRD) were employed to characterize the silver nanoflowers. This ‎nanoflowers SERS action in detecting Na3PO4 was reported and analyzed

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Preparation of Idebenone as a Thermosetting Nasal Gel for Better Bioavailability and Histopathological Effect

Background Idebenone is an extensively metabolized drug with poor water solubility that is used to treat Leiber’s hereditary optical neuropathy.

Objective This study aims to prepare idebenone nanoemulsion as a poloxamer-based nasal gel to overcome the extensive rate of hepatic metabolism for better bioavailability and lower histopathological effect on the nasal mucosa.

Methods The formulation strategy was based on eliciting mutual concentration reduction between the nanoemulsion and the carrier gel by setting their gelation temperature between 30-32°C to overcome the mucociliary dose washout. The o/w nanoemulsions rely on cremophor EL and transcutol as an emulsifying sys

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
An Evolutionary Bi-clustering Algorithm for Community Mining in Complex Networks

A network (or formally a graph) can be described by a set of nodes and a set of edges connecting these nodes. Networks model many real-world phenomena in various research domains, such as biology, engineering and sociology. Community mining is discovering the groups in a network where individuals group of membership are not explicitly given. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem that recently enjoyed a considerable interest. Among the proposed methods, the field of evolutionary algorithms (EAs) takes a remarkable interest. To this end, the aim of this paper is to present the general statement of community detection problem in social networks. Then, it visits the problem as an optim

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus