Genetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problems associated with multi-modal, noisy, high dimensional and discrete functions. However, with a range of benefits, there are multiple challenges as well such as GA can be time consuming to restore the images and may provide partial solution to the problem.
Background: Dyslipidemia is defined as an abnormally high level of various lipids in the blood. It is considered a major risk for atherosclerosis and coronary artery disease. Genetic susceptibility can have a significant influence on the development and progression of dyslipidemia. ApoB-100 R3500Q mutation and ApoE variants are among those genetic risks for dyslipidemia. This study aims to assess the possible contribution of ApoB and ApoE variants on lipid profile among a group of early-onset ischemic heart disease (IHD) patients in comparison to a group of controls. Methods: Forty patients with dyslipidemia and early-onset IHD without chronic conditions likely to cause derangement of lipid levels were recruited to this case-control study
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreABSTRACT: Oxadiazole ring is a heterocyclic molecule with an oxygen and two nitrogen atoms spread throughout its five-membered structure. There are four different isomers that have been discovered, Because of their wide applications in a range of sectors, including medications . Some of these biological activity are; anticonvulsant capacity, anticancer as well, antibacterial, antiviral, antifungal, antimalarial, antitubercular, anti-asthmatic, antidepressant, antidiabetic, antioxidant, antiparkinsonian, analgesic and anti-inflammatory, are just some of the therapeutic uses that have drawn attention to drug candidates containing an oxadiazole moiety. This review, we will examine the various methods of oxadiazole synthesis. The mo
... Show MoreHistorically, medicinal herbs have been utilized as an important origin of chemicals with particular therapeutic potentials, and they continue to be a great place to find new medication candidates. Parthenocissus quinquefolia L. is a member of the grape-growing family Vitaceae. It is indigenous to Central and North America. It is widely dispersed in Iraqi gardens and plant houses from north to south. Traditionally, it has many uses, like relieving constipation, treating jaundice, expectorant, emetic, and others. At the same time, its proven activities include antioxidant activity, antimicrobial, anti-diabetic, thrombin inhibitor effect, and medicine for treating eyelid eczema. Parthenocissus quinquefolia contains valuable phytochemicals lik
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More