Preferred Language
Articles
/
QRbUX4cBVTCNdQwCDkiU
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, which is used to cluster genes. FCM allows an object to belong to two or more clusters with a membership grade between zero and one and the sum of belonging to all clusters of each gene is equal to one. This paradigm is useful when dealing with microarray data. The total time required to implement the first model is 22.2589 s. The second model combines FCM and particle swarm optimization (PSO) to obtain better results. The hybrid algorithm, i.e., FCM–PSO, uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–PSO method is effective. The total time of implementation of this model is 89.6087 s. The third model combines FCM with a genetic algorithm (GA) to obtain better results. This hybrid algorithm also uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–GA method is effective. Its total time of implementation is 50.8021 s. In addition, this study uses cluster validity indexes to determine the best partitioning for the underlying data. Internal validity indexes include the Jaccard, Davies Bouldin, Dunn, Xie–Beni, and silhouette. Meanwhile, external validity indexes include Minkowski, adjusted Rand, and percentage of correctly categorized pairings. Experiments conducted on brain tumor gene expression data demonstrate that the techniques used in this study outperform traditional models in terms of stability and biological significance.

Crossref
View Publication
Publication Date
Thu Jun 16 2022
Journal Name
Al-khwarizmi Engineering Journal
Path Planning and Obstacle Avoidance of a Mobile Robot based on GWO Algorithm
...Show More Authors

planning is among the most significant in the field of robotics research.  As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 24 2015
Journal Name
Robotica
Multi-level control of zero-moment point-based humanoid biped robots: a review
...Show More Authors
SUMMARY<p>Researchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped </p> ... Show More
View Publication
Scopus (40)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Gas Sensor Application of New Composite Based on MWCNTs:CoPc:Metal Oxide
...Show More Authors

The synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with  CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (40)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFICIENCY EVALUATION OF ALKALOIDS FROM POMEGRANATE (Punica granatum) PEELS TOWARDS SOME PATHOGENIC FUNGI OF HUMAN: EFFICIENCY EVALUATION OF ALKALOIDS FROM POMEGRANATE (Punica granatum) PEELS TOWARDS SOME PATHOGENIC FUNGI OF HUMAN
...Show More Authors

This study focused on the role and importance of alkaloid compounds in Punica granatum peels which is one of many wide distribution medicinal fruits. Two kinds of pathogenic fungi were isolated from patients in Baghdad to be tested, also a type of extracts was prepared, alkaloids were isolated and partially purified and detected by two ways, a classic depended technique also used for determine these alkaloids, results showed an observed differences among extracts or treatments towards the fungi samples. So this study was one of the scientific applications to find natural alternative compounds that inhibit the growth of several pathogenic organisms that cause dangers and harms for human health.

View Publication Preview PDF
Publication Date
Thu Jun 27 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Synthesis, Characterization and Anticancer Activity of Chitosan Schiff Base / PEG Blend Doped with Gold and Silver Nanoparticles in Treatment of Breast Cancer Cell Line MCF-7
...Show More Authors

In the present study, chitosan Schiff base has been prepared from chitosan reaction with p-chloro benzaldehyde. The AuNPs and AgNPs were manufactured by extract of onion peels as a reducing agent. The AuNPs and AgNPs that have been synthesized were characterized through UV-vis spectroscopy, XRD analyses and SEM microscopy. The polymer blends of the chitosan / PEG has been prepared by using the approach of solution casting. Chitosan Schiff base / PEG Au and Ag nanocomposites were synthesized, nanocomposites and polymer blends have been characterized by FTIR which confirm the formation of Schiff base by revealing a new band of absorption at 1693 cm-1 as a result of the (C=N) imine group. FESEM, DSC and TGA confirm the thermal stability

... Show More
Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Comparative Permeability Estimation Method and Identification of Rock Types using Cluster Analysis from Well Logs and Core Analysis Data in Tertiary Carbonate Reservoir-Khabaz Oil Field
...Show More Authors

Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca

... Show More
View Publication Preview PDF
Crossref (1)
Crossref