Modified Opposition Based Learning to Improve Harmony Search Variants Exploration
...Show More Authors
The consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying
... Show MoreTo develop a petrol engine so that it works under the bi-engine pattern (producer gas-petrol) without any additional engine modifications, a single-point injection method inside the intake manifold is a simple and inexpensive method. Still, it leads to poor mixing performance between the air and producer gas. This deficiency can cause unsatisfactory engine performance and high exhaust emissions. In order to improve the mixing inside the intake manifold, nine separate cases were modelled to evaluate the impact of the position and angle orientation inside the intake manifold on the uniformity and spread of the mixture under AFR=2.07. A petrol engine (1.6 L), the maximum engine speed (8000 rpm), and bi-engine mode (petrol-producer ga
... Show MoreThe emergence of SARS-CoV-2, the virus responsible for the COVID-19 pandemic, has resulted in a global health crisis leading to widespread illness, death, and daily life disruptions. Having a vaccine for COVID-19 is crucial to controlling the spread of the virus which will help to end the pandemic and restore normalcy to society. Messenger RNA (mRNA) molecules vaccine has led the way as the swift vaccine candidate for COVID-19, but it faces key probable restrictions including spontaneous deterioration. To address mRNA degradation issues, Stanford University academics and the Eterna community sponsored a Kaggle competition.This study aims to build a deep learning (DL) model which will predict deterioration rates at each base of the mRNA
... Show MoreIn the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground: Several studies linked the development of steroid-resistant nephrotic syndrome (SRNS) to genetic variations in the multidrug resistance 1 (MDR1) gene, though a disparity in findings was underlined among children with different ethnic origins. Objective: This study examined the relationship between MDR1 variants (rs2032582 and rs2032583) and the risk of developing SRNS in Iraqi patients with idiopathic nephrotic syndrome (INS). Methods: This case-control study included children with steroid-sensitive INS (SSNS; n=30) and SRNS (n=30) from the Babylon Hospital for Maternity and Pediatrics. Sanger sequencing was used to determine the participants’ genotypes. Results: The rs2032582 genotypes and alleles were not associated
... Show MoreGlutathione-S-transferases (GSTs) play a role in the detoxification of environmental chemicals and mutagens, such as those inhaled during tobacco smoking. There have been conflicting reports concerning GST polymorphisms as risk factors in the development of lung cancer. No studies focused on Arab populations exposed to Waterpipe (WP) tobacco smoke have been undertaken. Here Polymerase Chain Reaction-Restriction Fragment Length Polymorphism (PCR-RFLP) and gene sequenc- ing were applied to analyze allelic variations in GSTP1-rs1695 and -rs1138272 amongst 123 lung cancer patients and 129 controls. The data suggest that WP smoking raised the risk of lung cancer more than three-fold (OR 3.6; 95% CI 2.1–6.0; p < 0.0001). However, there was no s
... Show More