Preferred Language
Articles
/
jeasiq-2209
Mathematical Modelling of Gene Regulatory Networks
...Show More Authors

    This research includes the use of an artificial intelligence algorithm, which is one of the algorithms of biological systems which is the algorithm of genetic regulatory networks (GRNs), which is a dynamic system for a group of variables representing space within time. To construct this biological system, we use (ODEs) and to analyze the stationarity of the model we use Euler's method. And through the factors that affect the process of gene expression in terms of inhibition and activation of the transcription process on DNA, we will use TF transcription factors. The current research aims to use the latest methods of the artificial intelligence algorithm. To apply Gene Regulation Networks (GRNs), we used a program (MATLAB2020), which provides facilitation to the most important biological concepts for building this biological interaction

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 24 2024
Journal Name
Journal Of Optics
Performance analysis of optical communication networks utilizing optical fibers and OFDM technology
...Show More Authors

This document provides an examination of research, on combining orthogonal frequency division multiplexing (OFDM) and optical fibers in communication networks. With the increasing need for data speeds and efficient use of bandwidth experts have been exploring the connection between OFDM, valued for its ability to handle multipath interference and optimize spectral usage and optical fiber technology which provides superior data transmission capabilities with low signal loss and strong protection, against electromagnetic disturbances. The review summarizes discoveries from studies examining the pros and cons of using OFDM, in optical communication networks. It discusses obstacles like fiber nonlinearity, chromatic dispersion and the effects o

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Swarm And Evolutionary Computation
Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks
...Show More Authors

Scopus (170)
Crossref (139)
Scopus Clarivate Crossref
Publication Date
Mon Oct 05 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval

Publication Date
Thu Mar 24 2022
Journal Name
Arab World English Journal
Collocation Networks of Selected Words in Academic Writing: A Corpus-Based Study
...Show More Authors

This study aims at shedding light on the linguistic significance of collocation networks in the academic writing context. Following Firth’s principle “You shall know a word by the company it keeps.” The study intends to examine three selected nodes (i.e. research, study, and paper) shared collocations in an academic context. This is achieved by using the corpus linguistic tool; GraphColl in #LancsBox software version 5 which was announced in June 2020 in analyzing selected nodes. The study focuses on academic writing of two corpora which were designed and collected especially to serve the purpose of the study. The corpora consist of a collection of abstracts extracted from two different academic journals that publish for writ

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
International Journal Of Interdisciplinary Telecommunications And Networking
Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks
...Show More Authors

Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro

... Show More
View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aims Mathematics
Solving quaternion nonsymmetric algebraic Riccati equations through zeroing neural networks
...Show More Authors

<abstract><p>Many variations of the algebraic Riccati equation (ARE) have been used to study nonlinear system stability in the control domain in great detail. Taking the quaternion nonsymmetric ARE (QNARE) as a generalized version of ARE, the time-varying QNARE (TQNARE) is introduced. This brings us to the main objective of this work: finding the TQNARE solution. The zeroing neural network (ZNN) technique, which has demonstrated a high degree of effectiveness in handling time-varying problems, is used to do this. Specifically, the TQNARE can be solved using the high order ZNN (HZNN) design, which is a member of the family of ZNN models that correlate to hyperpower iterative techniques. As a result, a novel

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-nahrain Journal Of Science
Enhancing Sparse Adjacency Matrix for Community Detection in Large Networks
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Multiwavelet based-approach to detect shared congestion in computer networks
...Show More Authors

Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
On Gradient Descent Localization in 3-D Wireless Sensor Networks
...Show More Authors

Localization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo

... Show More
View Publication Preview PDF