Preferred Language
Articles
/
ijs-1045
Deep Belief Network for Predicting the Predisposition to Lung Cancer in TP53 Gene

Lung cancer, similar to other cancer types, results from genetic changes. However, it is considered as more threatening due to the spread of the smoking habit, a major risk factor of the disease. Scientists have been collecting and analyzing the biological data for a long time, in attempts to find methods to predict cancer before it occurs. Analysis of these data requires the use of artificial intelligence algorithms and neural network approaches. In this paper, one of the deep neural networks was used, that is the enhancer Deep Belief Network (DBN), which is constructed from two Restricted Boltzmann Machines (RBM). The visible nodes for the first RBM are 13 nodes and 8 nodes in each hidden layer for the two RBMs. The enhancer DBN was trained by Back Propagation Neural Network (BPNN), where the data sets were divided into 6 folds, each is split into three partitions representing the training, validation, and testing. It is worthy to note that the proposed enhancer DBN predicted lung cancer in an acceptable manner, with an average F-measure value of  0. 96 and an average Matthews Correlation Coefficient (MCC) value of 0. 47 for 6 folds.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Fault Tolerance for Real Time Distributed System

This paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.

Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.

View Publication Preview PDF
Publication Date
Wed Jul 31 2024
Journal Name
Iraqi Geological Journal
Correlating Capillary Pressure and Resistivity Index for Carbonate Reservoir

Capillary pressure is a significant parameter in characterizing and modeling petroleum reservoirs. However, costly laboratory measurements may not be sufficiently available in some cases. The problem amplifies for carbonate reservoirs because relatively enormous capillary pressure curves are required for reservoir study due to heterogeneity. In this work, the laboratory measurements of capillary pressure and formation resistivity index were correlated as both parameters are functions of saturation. Forty-one core samples from an Iraqi carbonate reservoir were used to develop the correlation according to the hydraulic flow units concept. Flow zone indicator (FZI) and Pore Geometry and Structure (PGS) approaches were used to identify

... Show More
Scopus Crossref
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Structural and optical properties for PVA- PEG-MnCl2 composites

Polymer films of PEG and PVA and their blend with different
concentrations of MnCl2 (0, 2, 4, 6 and 10 %.wt) were study using
casting technique. The X-ray spectra of pure PEG, PVA and
PVA:PEG films and with addition of 2% concentrations from
(MnCl2) show amorphous structures. The results for FTIR show the
interaction between the filler and polymer blend results in
decreasing crystallinity with rich amorphous phase. This
amorphous nature confirms the complexation between the filler and
the polymer blend. The optical properties of (PVA:PEG/MnCl2)
contain the recording of absorbance (A) and explain that the
absorption coefficient (α), refractive index (n), extinction coefficient
(ko) and the dielectric cons

... Show More
Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Efficient Approach for Solving (2+1) D- Differential Equations

     In this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.

Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Scopus (16)
Crossref (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Romanian Neurosurgery
Coil migration during pressure-cooker technique for cerebral AVM

Introduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomograp

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Sun May 30 2021
Journal Name
Iraqi Journal Of Science
Preparation of PPy-WO3 Nano-composite for Supercapacitor Applications

In this work, polypyrrole (PPy) composites were chemically prepared by a chemical oxidation method. Also, Tungsten Trioxide (WO3) nanoparticles were prepared and added in certain proportions to PPy. The structure properties were studied for the polypyrole and tungesten trioxide separately before mixing them together. The X-ray diffraction (XRD) analysis revealed a hexagonal WO3 and a triclinic PPy. It was observed that the nano-composite prepared by the addition of WOwith 10 and 20% volume ratios to PPy shows a triclinic phase with the presence of hexagons. The molecular structures of PPy, WO3, and PPy–WO3 nano composites were depicted by Fourier-transform infrare

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
Scopus (14)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A lightweight AES Algorithm Implementation for Secure IoT Environment

In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the d

... Show More
Scopus (17)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

Scopus (17)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF