Preferred Language
Articles
/
MxYNBYcBVTCNdQwCyy6N
Signal compression and enhancement using a new orthogonal‐polynomial‐based discrete transform
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Enhancement of Aqueous Solubility and Dissolution Rate of Etoricoxib by Solid Dispersion Technique
...Show More Authors

Etoricoxib (EXB) is a highly selective cox-2 inhibitor which belongs to the non-steroidal anti-inflammatory drug (NSAID). EXB is a class II drug according to the biopharmaceutical classification system (BCS), which possess a very low aqueous solubility in water.  In the present study, many trials were made to improve the aqueous solubility and dissolution rate of EXB by solid dispersion technique.

Eighteenth EXB formulas were formulated as a solid dispersion using a variety of hydrophilic polymers (as carriers)   including poloxamer 407 (PXM 407), poloxamer 188 (PXM 188) and polyethylene glycol 4000 (PEG 4000) at different drug: polymer ratios (1:1, 1:3 and 1:5). These formulas were prepared by two methods; solvent

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (11)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jun 16 2022
Journal Name
Al-khwarizmi Engineering Journal
Path Planning and Obstacle Avoidance of a Mobile Robot based on GWO Algorithm
...Show More Authors

planning is among the most significant in the field of robotics research.  As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Mon Mar 09 2026
Journal Name
Journal Of Asian Architecture And Building Engineering
Visual storytelling and place-based learning: a generative approach to architectural cultural awareness
...Show More Authors

In architectural learning, it is difficult to stimulate cultural awareness through the traditional education approaches, which results in historic places being neglected as knowledge sources. This research explores the premise that sketch-based visual storytelling may act as a generative approach to connect cognition, emotion, and behavior in historical contexts. The study adopts a qualitative methodology to explore a learning experience comprising two phases: the first is a formal educational setting, and the second is a historical and cultural context, aiming to investigate the role of sketch-based storytelling in enhancing cultural awareness. MAXQDA was employed to code the students’ storyboards on three levels of cultural awareness, m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref