Preferred Language
Articles
/
ijs-6378
AHeuristic Strategy for Improving the Performance of Evolutionary Based Complex Detection in Protein-Protein Interaction Networks
...Show More Authors

One of the most interested problems that recently attracts many research investigations in Protein-protein interactions (PPI) networks is complex detection problem. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem wherein, recently, the field of Evolutionary Algorithms (EAs) reveals positive results. The contribution of this work is to introduce a heuristic operator, called protein-complex attraction and repulsion, which is especially tailored for the complex detection problem and to enable the EA to improve its detection ability. The proposed heuristic operator is designed to fine-grain the structure of a complex by dividing it into two more complexes, each being distinguished with a core protein. Then, it is possible for each of the remaining proteins associated with the original coarse-grained complex to repulse from one of the new generated complexes while attracted by the core protein of the second complex. The topology-based complex detection models presented in the literature are adopted to inter-play with the proposed heuristic operator inside the EA general framework. To assess the performance of the EA when coupled with the proposed heuristic operator, the well known Saccaromycaes Cerevisiae yeast PPI network and one reference set of benchmark complexes created from MIPS are used in the experiments. The results prove the positive impact of the heuristic operator to harness the strength of almost all adopted EA models. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Performance Assessment of Pile Models Chemically Grouted by Low-Pressure Injection Laboratory Device for Improving Loose Sand
...Show More Authors

The complexity and partially defined nature of jet grouting make it hard to predict the performance of grouted piles. So the trials of cement injection at a location with similar soil properties as the erecting site are necessary to assess the performance of the grouted piles. Nevertheless, instead of executing trial-injected piles at the pilot site, which wastes money, time, and effort, the laboratory cement injection devices are essential alternatives for evaluating soil injection ability. This study assesses the performance of a low-pressure laboratory grouting device by improving loose sandy soil injected using binders formed of Silica Fume (SF) as a chemical admixture (10% of Ordinary Portland Cement OPC mass) to di

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
Study on the effect of methotraxate drug on Retinol-Binding Protein 4 (RBP4), nesfatin and some trace elements in Iraqi male patients with rheumatoid arthritis
...Show More Authors

Methotrexate (MTX) is one of the most effective medications to treat rheumatoid arthritis (RA).Aserum of 60 Iraqi male patients suffering from RA as (G1) was newly diagnosis and the same patient in G1 after taking MTX as G2 and 40 Iraqi male healthy control as G3. Nesfatin-1 (Nf-1) is belong to the adipokine family withpleiotropic effect. Nf-1 has been found in different tissues, including stomach, pancreas, bone cells, cartilage and heart. Retinol binding protein (RBP4) was known as transpoter of retinol from its storage sites in the liver to the extrahepatic tissues. Moreover, RBP4 acts as adipokine and contributes in the pathophsyology of prototypic inflammatory disease, rheumatoid arthritis (RA). The results showed a significant increas

... Show More
Scopus
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Self-adaptive Differential Evolution based Optimized MIMO Beamforming 5G Networks
...Show More Authors

     The industrial factory is one of the challenging environments for future wireless communication systems, where the goal is to produce products with low cost in short time. This high level of network performance is achieved by distributing massive MIMO that provides indoor networks with joint beamforming that enhances 5G network capacity and user experience as well. Judging from the importance of this topic, this study introduces a new optimization problem concerning the investigation of multi-beam antenna (MBA) coverage possibilities in 5G network for indoor environments, named Base-station Beams Distribution Problem (BBDP). This problem has an extensive number of parameters and constrains including user’s location, required d

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
The Performance Differences between Using Recurrent Neural Networks and Feedforward Neural Network in Sentiment Analysis Problem
...Show More Authors

 With the spread use of internet, especially the web of social media, an unusual quantity of information is found that includes a number of study fields such as psychology, entertainment, sociology, business, news, politics, and other cultural fields of nations. Data mining methodologies that deal with social media allows producing enjoyable scene on the human behaviour and interaction. This paper demonstrates the application and precision of sentiment analysis using traditional feedforward and two of recurrent neural networks (gated recurrent unit (GRU) and long short term memory (LSTM)) to find the differences between them. In order to test the system’s performance, a set of tests is applied on two public datasets. The firs

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Real-time control for the transmission of information in wireless networks
...Show More Authors

Wireless  lietworking is·  constantly improving,  changing  and

though  ba ic  principle  is the same.  ['nstead of  using standard  cables  to transmit information fmm one point to another (qr more), it .uses  radio signals.  This paper  presents .a case  study considedng real-time remote

cqntroJ using Wireless UDP/JP-based networks,. The aim of-this werk is to

reduce  real-time· remote control  system  based upon a simulatio.n  model,

which can operate via general communication  l"]etworks, whieh on bodies. modern wireles  tcchnolqgy.

The  first  part includes· a  brief

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Empowerment Human Strategy on Enhancing the Financial Performance: Empirical study on Working Banks in Jordan
...Show More Authors

This study aimed at recognizing the impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan, the axes of the strategy were: informative sharing, free and independence, working teams, and organizational power. To achieve the objective of the study, a questionnaire is designed and distributed on the sample of the study, which represented 60 employees of Banks. After analyzing the data by using SPSS, the study resulted that there is positive impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan. It suggested that the working banks in Jordan should establish database, and to create working teams.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The New Complex Integral Transform "Complex Sadik Transform" and It's Applications
...Show More Authors

In this paper, we introduce a new complex integral transform namely ”Complex Sadik Transform”. The
properties of this transformation are investigated. This complex integral transformation is used to reduce
the core problem to a simple algebraic equation. The answer to this primary problem can than be obtained
by solving this algebraic equation and applying the inverse of complex Sadik transformation. Finally,
the complex Sadik integral transformation is applied and used to find the solution of linear higher order
ordinary differential equations. As well as, we present and discuss, some important real life problems
such as: pharmacokinetics problem ,nuclear physics problem and Beams Probem

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Crossref