Preferred Language
Articles
/
rhh2dZQBVTCNdQwCdRhG
Overlapping Structure Detection in Protein-Protein Interaction Networks Using a Modified Version of Particle Swarm Optimization
...Show More Authors

In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and hard optimization problem. One of the main difficulties in identifying overlapping protein complexes is the accuracy of the partitioning results. In order to accurately identify the overlapping structure of protein complexes, this paper has proposed an overlapping complex detection algorithm termed OCDPSO-Net, which is based on PSO-Net (a well-known modified version of the particle swarm optimization algorithm). The framework of the OCDPSO-Net method consists of three main steps, including an initialization strategy, a movement strategy for each particle, and enhancing search ability in order to expand the solution space. The proposed algorithm has employed the partition density concept for measuring the partitioning quality in PPI network complexes and tried to optimize the value of this quantity by applying the line graph concept of the original graph representing the protein interaction network. The OCDPSO-Net algorithm is applied to a Collins PPI network and the obtained results are compared with different state-of-the-art algorithms in terms of precision ( ), recall ( ), and F-measure ( ). Experimental results confirm that the proposed algorithm has good clustering performance and has outperformed most of the existing recent overlapping algorithms. .

Scopus Crossref
View Publication
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Experimental and Numerical Investigation on the Performance of Straight-Bladed Vertical Axis Wind Turbine by Adding Cavities to it Structure
...Show More Authors

As the prices of the fuel and power had fluctuated many times in the last decade and new policies appeared and signed by most of the world countries to eliminate global warming and environmental impact on the earth surface and humanity exciting, an urgent need appeared to develop the renewable energy harnessing technologies on the short-term and long-term and one of these promising technologies are the vertical axis wind turbines, and mostly the combined types. The purpose of the present work is to combine a cavity type Savonius with straight bladed Darrieus to eliminate the poor self-starting ability for Darrieus type and low performance for Savonius type and for this purpose, a three-bladed Darrieus type with symmetric

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Substrate Temperature Effect on the Structure, Morphological and Optical Properties of CuO/Sapphire Thin Films Prepared by Pulsed Laser deposition
...Show More Authors

This paper addresses the substrate temperature effect on the structure, morphological and optical properties of copper oxide (CuO) thin films deposited by pulsed laser deposition (PLD) method on sapphire substrate of 150nm thickness. The films deposited at two different substrate temperatures (473 and 673)K. The atomic force microscopy (AFM), Fourier transform infrared spectroscopy (FTIR) and UV-VIS transmission spectroscopy were employed to characterize the size, morphology, crystalline structure and optical properties of the prepared thin films. The surface characteristics were studied by using AFM. It is found that as the substrate temperature increases, the grain size increased but the surface roughness decreased.  The FTIR spec

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Chalcogenide Letters
Preparation and analysis of Ag2Se1-xTe x thin film structure on the physical properties at various temperatures by thermal evaporation
...Show More Authors

Silver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm

... Show More
Publication Date
Wed May 03 2023
Journal Name
Chalcogenide Letters
Preparation and analysis of Ag2Se1-xTe x thin film structure on the physical properties at various temperatures by thermal evaporation
...Show More Authors

Silver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref