Preferred Language
Articles
/
ijs-1045
Deep Belief Network for Predicting the Predisposition to Lung Cancer in TP53 Gene

Lung cancer, similar to other cancer types, results from genetic changes. However, it is considered as more threatening due to the spread of the smoking habit, a major risk factor of the disease. Scientists have been collecting and analyzing the biological data for a long time, in attempts to find methods to predict cancer before it occurs. Analysis of these data requires the use of artificial intelligence algorithms and neural network approaches. In this paper, one of the deep neural networks was used, that is the enhancer Deep Belief Network (DBN), which is constructed from two Restricted Boltzmann Machines (RBM). The visible nodes for the first RBM are 13 nodes and 8 nodes in each hidden layer for the two RBMs. The enhancer DBN was trained by Back Propagation Neural Network (BPNN), where the data sets were divided into 6 folds, each is split into three partitions representing the training, validation, and testing. It is worthy to note that the proposed enhancer DBN predicted lung cancer in an acceptable manner, with an average F-measure value of  0. 96 and an average Matthews Correlation Coefficient (MCC) value of 0. 47 for 6 folds.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Performance of Different Concatenated Coding Schemes for CDMA System

In this paper different channel coding and interleaving schemes in DS/CDMA system over multipath fading channel were used. Two types of serially concatenated coding were presented. The first one composed of Reed-Solomon as outer code, convolutional code as inner code and the interleaver between the outer and inner codes and the second consist of convolutional code as outer code, interleaved in the middle and differential code as an inner code. Bit error rate performance of different schemes in multipath fading channel was analyzed and compared. Rack receiver was used in DS/CDMA receiver to combine multipath components in order to enhance the signal to noise ratio at the receiver.

 

Crossref
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
A study of fermi hole for some atomic systems

the electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions

View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Simulation of Obstacle Avoidance for Auto Guided Land Vehicle

This research is concerned with designing and simulating an auto control system for a car provided with obstacle avoidance sensors. This car is able to pass through predefined path an around the detected obstacles, and then come back to the intended path. The IR sensor detects the existence of the obstacle through an assumed range of detection, while the visual sensor (camera) feeds back an image including the path that contains  an obstacle, which can be useful for determining the obstacle's length, speed, and direction. According to such information, the controller creates transient away point along the longitudinal axis of the obstacle which is the same as the transverse axis of the simulator path at an assumed distance from the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Heterogeneous Photocatalytic Degradation for Treatment of Oil from Wastewater

In the present study, advanced oxidation process / heterogeneous photocatalytic process (UV/TiO2/Fenton) system was investigated to the treatment of oily wastewater. The present study was conducted to evaluate the effect of hydrogen peroxide concentration H2O2, initial amount of the iron catalyst Fe+2, pH, temperature, amount of TiO2 and the concentration of oil in the wastewater.  The removal efficiency for the system UV/TiO2/Fenton at optimal conditions and dosage (H2O2 = 400mg/L, Fe+2 = 40mg/L, pH=5, temperature =30oC, TiO2=75mg/L) for 1000mg/L load was found to be 77%.

Aluminum foil cover around the re

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Constructing of Analysis Mathematical Model for Stream Cipher Cryptosystems

The aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR. 

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Laboratory Preparation of Simulated Sludge for Anaerobic Digestion Experimentation

Health and environmental factors as well as operational difficulties are major challenges facing the development of an anaerobic digestion process. Some of these problems relate to the use of sludge collected from primary and secondary clarifier units in wastewater treatment plants for laboratory purposes.

The present study addresses the preparation of sludge for laboratory purposes by using a mixture that consists of the digested sludge, which is less pathogenic, compared to the collected sludge from the primary or secondary clarifier, and food wastes. The sludge has been tested experimentally for 19 and 32 days under mesophilic conditions. The results show a steady methane production rate from the anaerobic dig

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Generation of Weak Coherent Pulses for Quantum Cryptography Systems

This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.

View Publication Preview PDF