The research deals with an evolutionary-based mutation with functional annotation to identify protein complexes within PPI networks. An important field of research in computational biology is the difficult and fundamental challenge of revealing complexes in protein interaction networks. The complex detection models that have been developed to tackle challenges are mostly dependent on topological properties and rarely use the biological properties of PPI networks. This research aims to push the evolutionary algorithm to its maximum by employing gene ontology (GO) to communicate across proteins based on biological information similarity for direct genes. The outcomes show that the suggested method can be utilized to improve the
... Show MoreAnemia is a major significant public health issue that affects both pregnant and non-pregnant women throughout the world. This study aimed to determine the prevalence and severity of anemia, as well as its classification, based on MCV values in non-pregnant women residing in the Garmian province in the east of Iraq. Blood samples were collected from non-pregnant women between the ages of 16 and 49 years. Anemia is classified as mild, moderate and severe, and as microcytic, normocytic and macrocytic depending on the level of Hb or mean corpuscular volume (MCV) respectively. In this study sociodemographic and hematological characteristics were also evaluated. The results showed that 56% of the study samples were anemic, and of the
... Show MoreA comparison of gas sensing performance of V2O5:Ag nanoparticles as thin film and as bulk pellet toward NO2 and NH3 is presented. V2O5:Ag nanoparticles thin films were deposited by vacuum thermal evaporation method on glass substrates while the pellets were prepared by powder technology. XRD patterns of thin film and pellet were polycrystalline with an orthorhombic structure. The value of average grain size is about 60 nm. The morphological properties of the samples have been distinguished by atomic force microscopy (AFM) and field effect scanning electron microscopy (FESEM) which indicated that the films showed homogeneous surfaces morphology a
... Show MoreSystemic lupus erythematosus (SLE) is a chronic autoimmune inflammatory disease with unknown etiology, though genetic and environmental factors appear to play a role in its pathogenesis. In particular, infectious processes are linked to the onset and exacerbation of SLE. The aim of the current study was to understand the relationship between some biochemical factors in SLE patients. 105 blood samples from both genders were collected. ELISA technique was used for detecting specific procalcitonin, vitamin D and calcium. The results of this study showed that SLE patients recorded the lowest percentages of calcium (7.36 ± 0.10 mg/dl) than control (11.97 ± 2.12 mg/dl), and vitamin D (7.79 ± 0.58 pg/ml) than control (22.10 ± 4.8
... Show More Depending on the high resistance to antibiotics, five isolates of Pseudomonas aeruginosa and 7 isolates of Serratia fonticola were selected out of 150 bacterial isolates from burn wards in Baghdad hospitals, which were later identified by VITEK2. A susceptibility test was done by using 15 antibiotics. The results showed that all the selected isolates were resistant to antibiotics: AMP, CTX, CAZ, GEN, PIP, TIC and TMP especially, while they were sensitive to IPE. The essential oils of Aloysia citrodora (Family: Verbenaceae), Rosmarinus officinalis (Family: Lamiaceae) and
The aim of this paper is to discuss the influence of nanoparticles and porous media, and magnetic field on the peristaltic flow transport of a couple stress fluid in an asymmetric channel with different wave forms of non-Newtonian fluid. Initially, mathematical modeling of the two dimensions and two directional flows of a couple stress fluid with a nanofluid is first given and then simplified beneath hypothesis of the long wave length and the low Reynolds number approximation. After making these approximations, we will obtain associated nonlinear differential equations. Then, the exact solutions of the temperature distribution, nanoparticle concentration, velocity, stream function, and pressure gradient will be calculated. Fin
... Show MoreThe result involution graph of a finite group , denoted by is an undirected simple graph whose vertex set is the whole group and two distinct vertices are adjacent if their product is an involution element. In this paper, result involution graphs for all Mathieu groups and connectivity in the graph are studied. The diameter, radius and girth of this graph are also studied. Furthermore, several other graph properties are obtained.
The toxicity effect of Chanca piedra (Phyllanthus niruri)leaves extract was studied on albino rats. Rats were divided into four groups, four per group. Group 1 received water and feeds only, whileonly. Groups 2, 3, and 4 were administered doses of the extract 200 mg/kg, 400 mg/kg, and 800 mg/kg body weight respectively. Parameters studied were indices of liver and kidney function. Results showed that final body weight, serum, AST, ALP, urea, Creatinine, and some electrolytes were not affected by the administration of the different doses of the extract. ALT significantly increased by administration of 200 mg/kg and 400 mg/kg of the extract when compared with the control. Besides, there was asignificant increase in the level of
... Show MoreThe mineralogical study using X-ray diffraction (XRD) supported by scanning electron microscopic (SEM) examination and energy-dispersive spectroscopy (EDS) on the claystone of the Kolosh Formation from northern Iraq was conducted to Shows the provenance history of rocks. Chlorite, montmorillonite, illite, palygorskite, and kaolinite were recorded in different amounts in the study area. The association of montmorillonite and chlorite in the claystone of the Kolosh Formation (Paleocene) refers to the marine environment. Chlorite and montmorillonite are the common minerals in the Kolosh Formation with less common of illite, kaolinite and palygorskite. These clay minerals are of authigenic, detrital and diagenetically origin, which
... Show MoreCloud computing is a pay-as-you-go model that provides users with on-demand access to services or computing resources. It is a challenging issue to maximize the service provider's profit and, on the other hand, meet the Quality of Service (QoS) requirements of users. Therefore, this paper proposes an admission control heuristic (ACH) approach that selects or rejects the requests based on budget, deadline, and penalty cost, i.e., those given by the user. Then a service level agreement (SLA) is created for each selected request. The proposed work uses Particle Swarm Optimization (PSO) and the Salp Swarm Algorithm (SSA) to schedule the selected requests under budget and deadline constraints. Performances of PSO and SSA with and witho
... Show MoreMeasuring goat weight on a farm is carried out by two methods. The first method conventionally measures the chest girth (CG) and body length (BL), while the second is performed using a scale. This study aimed to facilitate the CG and BL measurements to estimate goat weight more efficiently through image processing. The endpoints of CG and BL were determined automatically using binary large object (BLOB) segmentation. The images of 120 goats were taken at three different shooting distances of 50 cm, 70 cm, and 90 cm. The statistical testing of the three scenarios in this study explained that the ideal distance to take pictures is the basis for determining whether or not the size of the circumference and BL is appropriate as a fea
... Show MoreThe topic of modulus of smoothness still gets the interest of many researchers due to its applicable usage in different fields, especially for function approximation. In this paper, we define a new modulus of smoothness of weighted type. The properties of our modulus are studied. These properties can be easily used in different fields, in particular, the functions in the Besov spaces when
Chemical polymerization produces polyaniline in two concentrations (0.02,0.05g) at room temperature. The reaction of polymerization was exothermal in nature. The characterization peak was observed in the FTIR range between 1470 and 1560cm-1which defined benzenoid and quinoid ring. To find out the effects Fe2O3, this investigation was carried out with two weights of Fe2O3 (0.05 and 0.02 g). In the experiment part, 32 mice were separated into eight groups, as indicated. The experiment lasted for 35 days. The results showed a significant (P < 0.05) decrease in sperm motility, concentration, percentage of live sperm and testosterone concentration with a significant (P &
... Show MoreThis study is achieved in the local area of the Eridu oil field, where the Mishrif Formation is considered the main productive reservoir. The Mishrif Formation was deposited during the Cretaceous period in the secondary sedimentary cycle (Cenomanian-Early Turonian as a part of the Wasia Group, a carbonate succession widespread throughout the Arabian Plate.
The Mishrif Formation already have been evaluated in terms of depositional environments and their diagenetic processes. Here, it will test the previous conclusions with petrophysical properties delineated by using well logging. The results show there is a fully matching with two reservoir units (MA and MB). Dissolution and primary porosity are responsible for f
... Show MoreThis paper aims to calculate the petrophysical properties in the Al-Ahdab field in the middle of Iraq within the Mauddud Formation. This study was based on the information available from well logs. The interactive petrophysical software IP (V4.5) was used to calculate the porosity, hydrocarbon saturation and shale volume, divide the formation into reservoir units and buffer units, and evaluate these units in each well. The Mauddud was divided into five units, two of them were considered good reservoirs having good petrophysical properties (high porosity, Low water saturation, and low shale volume). The other three are not reservoirs because of poor petrophysical properties.
In this paper, we introduce the bi-normality set, denoted by , which is an extension of the normality set, denoted by for any operators in the Banach algebra . Furthermore, we show some interesting properties and remarkable results. Finally, we prove that it is not invariant via some transpose linear operators.
The study of the chemical and physical factors that induce egg-laying is important for understanding mosquitoes' ecology. These substances may also help assess and control mosquito populations. With this in mind, we have highlighted the attractiveness of Culex pipiens gravid females concerning the containers' color and surface, which has enabled us to show that females of this species are always attracted to large containers of yellow. The ethological tests were made with four biopesticides on the attractiveness of C. pipiens females. It has been observed that the highest densities of the eggs are deposited in the container which contains the biopesticides extracts compared to that which includes the spring wat
... Show MoreMarking content with descriptive terms that depict the image content is called “tagging,” which is a well-known method to organize content for future navigation, filtering, or searching. Manually tagging video or image content is a time-consuming and expensive process. Accordingly, the tags supplied by humans are often noisy, incomplete, subjective, and inadequate. Automatic Image Tagging can spontaneously assign semantic keywords according to the visual information of images, thereby allowing images to be retrieved, organized, and managed by tag. This paper presents a survey and analysis of the state-of-the-art approaches for the automatic tagging of video and image data. The analysis in this paper covered the publications
... Show MoreGiven an exterior algebra over a finite dimension vector space v, and let , where is a graded ideal in . The relation between the algebra and regarding to -quadratic and - quadratic will be investigated. We show that the algebra is - quadratic if and only if is - quadratic. Furthermore, it has been shown that the algebra is - quadratic if and only if is - quadratic.
The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is now the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the robust system. In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man
... Show MoreIn this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between t
... Show MoreThe first step in this research is to find some of the necessary estimations in approximation by using certain algebraic polynomials, as well as we use certain specific points in approximation. There are many estimations that help to find the best approximation using algebraic polynomials and geometric polynomials. Throughout this research, we deal with some of these estimations to estimate the best approximation error using algebraic polynomials where the basic estimations in approximation are discussed and proven using algebraic polynomials that are discussed and proven using algebraic polynomials that are specified by the following points and if as well as if .
For the second step of the work, the estimatio
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreThis paper calculated the Duration Magnitude (MD) equation using data from the Iraqi Meteorological Organization and seismology (IMOS). It is an empirically determined equation and expressed as:
The epicentral distance and local geological conditions affect the duration of the coda. The data is obtained from 7 seismic stations in the network. The new proposed duration magnitude equation results from applying linear regression analysis to the data of a seismic signal duration with correlation coefficient R2=0.76; and a standard deviation value of 0.049. Station corrections indicated by Sc are also specified for the seismic stations that range from -0.024 to + 0.02.
People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreThis paper aims to introduce the concepts of -closed, -coclosed, and -extending modules as generalizations of the closed, coclossed, and extending modules, respectively. We will prove some properties as when the image of the e*-closed submodule is also e*-closed and when the submodule of the e*-extending module is e*-extending. Under isomorphism, the e*-extending modules are closed. We will study the quotient of e*-closed and e*-extending, the direct sum of e*-closed, and the direct sum of e*-extending.
Iron ore deposits have been identified from Nawgwezany Mishao in the Shalair Valley area within the Iraqi Zagros Suture Zone (IZSZ) at NE-Iraq. The iron ore is mainly hosted by the Shalair Metamorphic Rock Group calcschist. The transmitted and reflected light microscope study and X-ray diffraction of the calcschist revealed that the predominance minerals are calcite, and sillimanite, while muscovite, graphite, k-feldspar, and opaque mineral represent minor constituents. Meanwhile, skarn host rock as a second host rock shows the mineral assemblages of clinopyroxene, quartz, hornblende, epidote, plagioclase, sericite, garnet, and opaque minerals. The field and petrographical data indicated that the iron ore includes magnetite, hem
... Show MoreEndometrial Cancer (EC) is one of the most common malignancy of the female reproductive system. With an increasing incidence, it is important to improve the new prognosis ways for its pre-diagnosis that must be early, accurate and effective. This study aimed to search for biological (like some new interleukins) which could help in early diagnosis of EC before the hysterectomy. Currently not enough research is being done exploiting linking between the interleukins submitted in this study and EC. Epically IL-36 and IL-38, which have been recently described and are still under study in the world. This study is the first of its kind in Iraq. Fifty-five patients with EC (mainly in their first or second stage, due to early diagnosis and who ne
... Show MoreThe main task of creating new digital images of different skin diseases is to increase the resolution of the specific textures and colors of each skin disease. In this paper, the performance of generative adversarial networks has been optimized to generate multicolor and histological color digital images of a variety of skin diseases (melanoma, birthmarks, and basal cell carcinomas). Two architectures for generative adversarial networks were built using two models: the first is a model for generating new images of dermatology through training processes, and the second is a discrimination model whose main task is to identify the generated digital images as either real or fake. The gray wolf swarm algorithm and the whale swarm alg
... Show MoreThe analysis of the hyperlink structure of the web has led to significant improvements in web information retrieval. This survey study evaluates and analyzes relevant research publications on link analysis in web information retrieval utilizing diverse methods. These factors include the research year, the aims of the research article, the algorithms utilized to complete their study, and the findings received after using the algorithms. The findings revealed that Page Rank, Weighted Page Rank, and Weighted Page Content Rank are extensively employed by academics to properly analyze hyperlinks in web information retrieval. Finally, this paper analyzes the previous studies.