Preferred Language
Articles
/
rhh2dZQBVTCNdQwCdRhG
Overlapping Structure Detection in Protein-Protein Interaction Networks Using a Modified Version of Particle Swarm Optimization
...Show More Authors

In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and hard optimization problem. One of the main difficulties in identifying overlapping protein complexes is the accuracy of the partitioning results. In order to accurately identify the overlapping structure of protein complexes, this paper has proposed an overlapping complex detection algorithm termed OCDPSO-Net, which is based on PSO-Net (a well-known modified version of the particle swarm optimization algorithm). The framework of the OCDPSO-Net method consists of three main steps, including an initialization strategy, a movement strategy for each particle, and enhancing search ability in order to expand the solution space. The proposed algorithm has employed the partition density concept for measuring the partitioning quality in PPI network complexes and tried to optimize the value of this quantity by applying the line graph concept of the original graph representing the protein interaction network. The OCDPSO-Net algorithm is applied to a Collins PPI network and the obtained results are compared with different state-of-the-art algorithms in terms of precision ( ), recall ( ), and F-measure ( ). Experimental results confirm that the proposed algorithm has good clustering performance and has outperformed most of the existing recent overlapping algorithms. .

Scopus Crossref
View Publication
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Use of Social Media Networks (SMNs) in Knowledge Sharing, by Using Social Cognitive Theory (SCT) A Study Conducted in Some of Iraqi Universities
...Show More Authors

   SMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
Preservation of Required Chlorine Concentration in Baghdad Water Supply Networks using On-Site Chlorine Injection
...Show More Authors

The chlorine concentration variation in Baghdad water networks was studied. The
chlorine data were collected from Mayoralty of Baghdad and Ministry of Environment
(MOE) for the networks for both sides of the city Karkh and Rasafa for (2008-2009). The
study of these data indicates that there are no systematic testing program .Classified GIS
maps showed that the areas far from the treatment plants have almost always low
chlorine concentration .This indicates that the problem of the low chlorine concentration
in the far areas is due to cracks of pipe along the conveyance path ,as expected. The area's
most frequently have low concentration are Al-sadir,Al-Kadhimya, and Al-Amiria . It
was found also that the chlorine c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction in One of Iraqi Carbonate Reservoir Using Hydraulic Flow Units and Neural Networks
...Show More Authors

Permeability determination in Carbonate reservoir is a complex problem, due to their capability to be tight and heterogeneous, also core samples are usually only available for few wells therefore predicting permeability with low cost and reliable accuracy is an important issue, for this reason permeability predictive models become very desirable.

   This paper will try to develop the permeability predictive model for one of  Iraqi carbonate reservoir from core and well log data using the principle of Hydraulic Flow Units (HFUs). HFU is a function of Flow Zone Indicator (FZI) which is a good parameter to determine (HFUs).

   Histogram analysis, probability analysis and Log-Log plot of Reservoir Qua

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Eurasian Chemical Communications
Assessment of hypoxemia status by measuring serum level of hypoxia inducible factor 1 alpha in relation to tumor suppression protein p53, estradiol and tumor proliferation markers of breast cancer in Thi-Qar province/Iraq
...Show More Authors

Scopus (9)
Scopus Clarivate
Publication Date
Tue Jan 01 2019
Journal Name
Chemical Industry And Chemical Engineering Quarterly
Optimization of dye adsorption process for Albizia lebbeck pods as a biomass using central composite rotatable design model
...Show More Authors

Albizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal effi

... Show More
View Publication
Scopus (13)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Chemical Industry And Chemical Engineering Quarterly
Optimization of dye adsorption process for Albizia lebbeck pods as a biomass using central composite rotatable design model
...Show More Authors

Albizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal effi

... Show More
View Publication
Scopus (13)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Modified Support Vector Machine Classifiers Using Stochastic Gradient Descent with Application to Leukemia Cancer Type Dataset
...Show More Authors

Support vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Facial Emotion Recognition from Videos Using Deep Convolutional Neural Networks
...Show More Authors

Its well known that understanding human facial expressions is a key component in understanding emotions and finds broad applications in the field of human-computer interaction (HCI), has been a long-standing issue. In this paper, we shed light on the utilisation of a deep convolutional neural network (DCNN) for facial emotion recognition from videos using the TensorFlow machine-learning library from Google. This work was applied to ten emotions from the Amsterdam Dynamic Facial Expression Set-Bath Intensity Variations (ADFES-BIV) dataset and tested using two datasets.

View Publication Preview PDF
Scopus (56)
Crossref (40)
Scopus Crossref