Preferred Language
Articles
/
ijs-8683
Parallel Particle Swarm Optimization Algorithm for Identifying Complex Communities in Biological Networks
...Show More Authors

    Identification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed to detect complex biological communities with high quality. Secondly, the variability in the capability of PSO to extract community structure in biological networks is studied when different types of crossover operators are used. Finally, to reduce the computational time needed to solve this problem, especially when detecting complex communities in large-scale biological networks, we have implemented parallel computing to execute the algorithm. The performance of the proposed algorithm was tested and evaluated on two real biological networks. The experimental results showed the effective performance of the proposed algorithm when using single-point crossover operator, and its superiority over other counterpart algorithms. Moreover, the use of parallel computing in the proposed algorithm representation has greatly reduced the computational time required for its execution.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic –Based Face Retrieval Using Statistical Features
...Show More Authors

Content-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Review of Software Watermarking
...Show More Authors

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Arabic Handwriting Word Recognition Based on Scale Invariant Feature Transform and Support Vector Machine
...Show More Authors

Offline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters.  In this paper a proposed method for Offline Arabic handwritten recognition. The   proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and   support vector machines (SVMs) to enhance the recognition accuracy. The proposed method  experimented using (AHDB) database. The experiment result  show  (99.08) recognition  rate.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Optimal characteristics of wind turbine to maximize capacity factor
...Show More Authors

The capacity factor is the main factor in assessing the efficiency of wind Turbine. This paper presents a procedure to find the optimal wind turbine for five different locations in Iraq based on finding the highest capacity factor of wind turbine for different locations. The wind data for twelve successive years (2009-2020) of five locations in Iraq are collected and analyzed. The longitudes and latitudes of the candidate sites are (44.3661o E, 33.3152o N), (47.7738o E, 30.5258o N), (45.8160o E, 32.5165o N), (44.33265o E, 32.0107o N) and (46.25691o E, 31.0510o N) for Baghdad, Basrah, Al-Kut, Al-Najaf, and Al-Nasiriyah respectively. The average wind velocity, standard deviation, Weibull shape and scale factors, and probability density functi

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Effect of laser process an inclined surface cutting of mild steel then analysis data statistically by RSM
...Show More Authors

The regression analysis process is used to study and predicate the surface response by using the design of experiment (DOE) as well as roughness calculation through developing a mathematical model. In this study; response surface methodology and the particular solution technique are used. Design of experiment used a series of the structured statistical analytic approach to investigate the relationship between some parameters and their responses. Surface roughness is one of the important parameters which play an important role. Also, its found that the cutting speed can result in small effects on surface roughness. This work is focusing on all considerations to make interaction between the parameters (position of influenc

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc

... Show More
Scopus (8)
Scopus
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
THE EFFECT OF CUTOFF WALL ANGLE ON SEEPAGE UNDER DAMS
...Show More Authors

Flow of water under concrete dams generates uplift pressure under the dam, which may cause the dam to function improperly, in addition to the exit gradient that may cause piping if exceeded a safe value. Cutoff walls usually used to minimize the effect of flow under dams. It is required to
1)minimize the flow quantity to conserve water in the reservoir, it is also required to
2)minimize the uplift pressure under the dam to maintain stability of the dam, and it is required to

3) minimize the exit gradient to prevent quick condition to occur at the toe of the dam where piping may occur and may cause erosion of the soil. Varying the angle of cutoff walls affects its influence on the factors aforementioned that are required to

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
A comparative reading of the social and political satire in the works of Abu al-Fadl Zrui Nasrabad and Ahmad Rajab (The tadhk: خوانش تطبیقی طنز اجتماعی – سیاسی در آثار ابوالفضل زرویی نصرآباد و احمد رجب(مورد مطالعه: تذکرة المقامات زرویی و نصف كلمة احمد رجب)
...Show More Authors

           Satire is genre of the literary arts that has always been the source of human interest. Because  it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at

... Show More
View Publication Preview PDF
Crossref