Preferred Language
Articles
/
uBitA5gBVTCNdQwCUql4
Improving the Reliability of Evolutionary Algorithm for Complex Detection in Noisy Protein-Protein Interaction Networks
...Show More Authors

Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological process, and cellular component is used to get the functional domain. The reliability of the proposed algorithm is examined against the algorithms proposed in the literature. To this end, a yeast protein-protein interaction dataset is used in the assessment of the final quality of the algorithms. To make fake negative controls of PPIs that are wrongly informed and are linked to the high-throughput interaction data, different noisy PPINs are created. The noisy PPINs are synthesized with a different and increasing percentage of misinformed PPIs. The results confirm the effectiveness of the extended evolutionary algorithm design to utilize the biological knowledge of the gene ontology. Feeding EA design with GO annotation data improves reliability and produces more accurate detection results than the counterpart algorithms.

Scopus Crossref
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
GIS as A Tool for Expansive Soil Detection at Sulaymaniyah City
...Show More Authors

Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An Effective Hybrid Deep Neural Network for Arabic Fake News Detection
...Show More Authors

Recently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural

... Show More
View Publication Preview PDF
Scopus (38)
Crossref (20)
Scopus Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology &amp; Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of Internal Audit Standards IIA`s in improving the local guideline and its reflection on the efficiency of internal audit performance
...Show More Authors

The function of internal auditing has become an important function that aims at achieving objectives that are compatible with these developments and changes that have occurred in many countries in the world, which required the emergence of professional associations and institutes in the profession of internal auditing. Improve the guideline of the internal audit units issued by the Federal Audit Bureau to enhance the efficiency of internal audit performance in Iraqi government units. The researchers adopted the statistical method of proving the hypothesis by constructing a questionnaire that included three main axes: supporting the senior management in adopting the current guide, and the second being the importance of improving t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of General Medicine
The Value of Longitudinal Strain versus Coronary Angiography in Detection of Coronary Artery Disease
...Show More Authors

Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
DETECTION OF sHLA-G PROTEINS IN THE SERA OF PATIENTS INFECTED WITH VISCERAL LEISHMANIASIS
...Show More Authors

Visceral leishmaniasis (VL) or kala-azar is one of the worlds most neglected tropical diseases in mortality and fourth in morbidity, rK39 dipstick was used to diagnose the suspected infected patients as cheapest simple technique which can differentiate recent from chronic infection, for disease out-coming, naïve T-lymphocyte cells should be differentiated into pathogen-specific immunity responses, such as T-helper 1(Th-1) or (Th-2). HLA-G is a special protein defined as nonclassical HLA class I molecule can suppress the immune system through prevention of T-cell function by foul all T-cell mechanisms. So, this study aimed to detect and evaluate the level of sHLA-G in the sera of patients infected with VL. The results showed that there was

... Show More
Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
The Role of MRI-US Fusion Techniques in Detection of Clinically Significant Prostate Cancer
...Show More Authors

Prostate cancer is the commonest male cancer and the second leading cause of cancer-related death in men. Over many decades, prostate cancer detection represented a continuous challenge to urologists. Although all urologists and pathologists agree that tissue diagnosis is essential especially before commencing active surgical or radiation treatment, the best way to obtain the biopsy was always the big hurdle. The heterogenicity of the tumor pathology is very well seen in its radiological appearance. Ultrasound has been proven to be of limited sensitivity and specificity in detecting prostate cancer. However, it was the only available targeting technique for years and was used to guide biopsy needle passed transrectally or transperineally

... Show More
View Publication Preview PDF
Crossref