Preferred Language
Articles
/
ijs-8503
An Evolutionary-Based Mutation With Functional Annotation to Identify Protein Complexes Within PPI Networks
...Show More Authors

     The research deals with an evolutionary-based mutation with functional annotation to identify protein complexes within PPI networks. An important field of research in computational biology is the difficult and fundamental challenge of revealing complexes in protein interaction networks. The complex detection models that have been developed to tackle challenges are mostly dependent on topological properties and rarely use the biological  properties of PPI networks. This research aims to push the evolutionary algorithm to its maximum by employing gene ontology (GO) to communicate across proteins based on biological information similarity for direct genes. The outcomes show that the suggested method can be utilized to improve the predictability of the complexes identified. The GO functional annotation of proteins as a heuristic guide is injected into the framework of single-objective evolutionary algorithms (EAs), while the complex detection community score (CS) model works as a fitness function in EAs. In the experiments, we analyzed the performance of our proposed algorithm when applied to the publicly accessible yeast protein networks. The results show a considerable improvement in the detection ability of complexes in the PPI network.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
The Correlation Study between TP53 Gene Expression and Acute Myeloid Leukemia in Iraq
...Show More Authors

     Acute myeloid leukemia represents the most prevalent type of acute leukemia in adults. Mutations in the tumor protein (TP53) gene have been found in more than half of all human cancers. This study was done to investigate the relationship between TP53 gene expression and the appearance and progression of acute myeloid leukemia in Iraq. This study included 100 subjects, divided into 60 patients suffering from pre-diagnostic acute myeloid leukemia and 40 healthy individuals. The difference in TP53 gene expression between acute myeloid leukemia patients and healthy individuals has been investigated, and the gene expression of TP53 has been measured after extraction of total RNA at concentrations (15–83 n

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adaptive Canny Algorithm Using Fast Otsu Multithresholding Method
...Show More Authors

   In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm.      The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.  
 

View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Mon Jan 29 2018
Journal Name
Iraqi Journal Of Science
Phylogenetic analysis of cpn60 gene from locally isolated Acinetobacter baumannii
...Show More Authors

This study was aimed to analysis phylogenetic tree of the gene cpn60 in Acinetobacter baumannii that was identified in Baghdad. Study included collection two hundred specimens (fifty from UTI, fifty from wound infection , fifty from respiratory tract infection and fifty from otitis infections) . In primary laboratory diagnosis and confirmed by using VITEK- 2 Compact system, twenty isolates of this bacterium were indentified (10%) from total specimens. Extraction of geneteic material to detect target gene by amplification this target gene. DNA
sequencing of all isolates was done. Then alignment of sequencing in NCBI and draw phylogenetic tree by use Geneious 9 software among sequence of locally i

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Genotyping of fusA Gene from Clinical Isolates Acinetobacter baumannii in Baghdad
...Show More Authors

This study aims at detecting the differences in genotyping of coding region fusA gene in clinical isolates of Acinetobacter baumannii from Baghdad, Iraq. Collected two hundred clinical samples (50 samples from urine, 50 samples from wound, 50 samples from sputum and 50 samples from otitis infections). Laboratory diagnosis for bacterial isolates carried out by some biochemical tests and confirmed by using VITEK- 2 compact system. The results appeared that twenty isolates of Acinetobacter baumannii in all these samples. Genotyping study was performed of coding region fusA gene of the extracted genome of all bacterial isolates and used specific primers in achieved amplification process of this target gene. DNA sequencing of this gene and alig

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
Effect of levels in Dual Tree Complex Wavelet Transform when design Universal image stego-analytic
...Show More Authors

Universal image stego-analytic has become an important issue due to the natural images features curse of dimensionality. Deep neural networks, especially deep convolution networks, have been widely used for the problem of universal image stegoanalytic design. This paper describes the effect of selecting suitable value for number of levels during image pre-processing with Dual Tree Complex Wavelet Transform. This value may significantly affect the detection accuracy which is obtained to evaluate the performance of the proposed system. The proposed system is evaluated using three content-adaptive methods, named Highly Undetetable steGO (HUGO), Wavelet Obtained Weights (WOW) and UNIversal WAvelet Relative Distortion (UNIWARD).
The obtain

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Steganography Technique using Genetic Algorithm
...Show More Authors

Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
Bionic and its reflections in the design of industrial products
...Show More Authors

The current research dealt with the development of sciences and arts over the course of human history, and the development of sciences with their natural and human trends are important areas in developing the knowledge and application base for industrial product design and design in its various fields. Bionic science is one of the sciences that works on applying biological methods and systems found in nature to study and design engineering systems and modern technology, and for industrial products to be highly efficient, durable and resistant to natural variables in daily life for use. The transfer of technology between life forms and industrial products is desirable because the processes of development at the level of science in general

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref