Preferred Language
Articles
/
QRbUX4cBVTCNdQwCDkiU
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, which is used to cluster genes. FCM allows an object to belong to two or more clusters with a membership grade between zero and one and the sum of belonging to all clusters of each gene is equal to one. This paradigm is useful when dealing with microarray data. The total time required to implement the first model is 22.2589 s. The second model combines FCM and particle swarm optimization (PSO) to obtain better results. The hybrid algorithm, i.e., FCM–PSO, uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–PSO method is effective. The total time of implementation of this model is 89.6087 s. The third model combines FCM with a genetic algorithm (GA) to obtain better results. This hybrid algorithm also uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–GA method is effective. Its total time of implementation is 50.8021 s. In addition, this study uses cluster validity indexes to determine the best partitioning for the underlying data. Internal validity indexes include the Jaccard, Davies Bouldin, Dunn, Xie–Beni, and silhouette. Meanwhile, external validity indexes include Minkowski, adjusted Rand, and percentage of correctly categorized pairings. Experiments conducted on brain tumor gene expression data demonstrate that the techniques used in this study outperform traditional models in terms of stability and biological significance.

Crossref
View Publication
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
Investigation of Flagellum genes FleN and FlgE and Gene Expression of FleN Gene in Pseudomonas Aeruginosa Clinical Isolates
...Show More Authors

The opportunistic multidrug resistance pathogen Pseudomonas aeruginosa has one or several flagella, and the numbers of these sophisticated machines are regulated by the flagellar regulator gene FleN. The flagellar hook gene FlgE is important for its synthesis, motility and tolerance to antibiotics. Bacteriahave resistance to antibiotics, especially to cephalosporin beta-lactam antibiotics. For the current study, 102 clinical specimens were collected and identified using routine laboratory tests and confirmed by Vitek-2 compact system.  A total of 33 isolates of P. aeruginosa were identified. The antibiotic susceptibility test was done by the Vitek 2 Compact system. Flagellar gene detected by conventional PCR revealed that the FleN

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Bionatura
Gene expression of a nitrogen tolerance gene ZmNR1 under the influence of different levels of nitrogen in maize
...Show More Authors

A field experiment was carried out in the College of Agricultural Engineering Sciences - University of Baghdad, during the fall season of 2021 to find out which cultivated cultivars of maize are efficient under nitrogen fertilization. The experiment was applied according to an RCBD (split-plot design with three replications). The cultivars of the experiment (Baghdad, 5018, Sarah) supply three levels of nitrogen fertilizer, which are N1 (100 kg.N/ha), N2 (200 kg.N/ha) and N3 (300 kg.N/ha). The statistical analysis results showed the superiority of the Sarah genotype, which gave the highest value of SOD and CAT enzymes, reaching 11.59 units mg-1 and 10.76 units mg-1 . Protein sequentially, while cultivar5018 outperformed as it gave th

... Show More
View Publication
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
The role of Adipocytokines, Vitamin D, and C in Colorectal Cancer
...Show More Authors

Colorectal cancer is the world's 3rd most frequent malignant neoplasm and the 4th most common cancer in Iraq. Leptin and Adiponectin are two major Adipocytokines produced by adipose cells that have opposite effects on the formation of colorectal tumors. Leptin induces tumor growth and metastasis, whereas Adiponectin inhibits it. 1,25-Dihydroxyvitamin D controls and limits cancer cell proliferation, differentiation, and survival. Vitamin C deficiency, on the other hand, has been regularly detected in cancer tissues and has potent anti-cancer properties. The purpose of this study was to look at the biochemical role of circulatory Adipocytokine levels (Adiponectin and Leptin) as well as the anti-cancer potentials of Vi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Evaluation of atmospheric cold plasma technique activity on phenylpropanoids gene expression and essential oil contents and different traits of Ocimum basilicum L.
...Show More Authors

The current study was conducted for studying the impact of cold plasma on the expression level of three genes that participate in the biosynthesis of the phenylpropanoid pathway in Ocimum basilicum. These studied genes were cinnamate 4-hydroxylase (c4h), 4-coumarate CoA ligase (4cl), and eugenol O-methyl transferase (eomt). Also, the cold plasma impact was studied on the essential oil components and their relation with the gene expression level. The results demonstrated that cold plasma seeds germination of the treated groups 2 (initially for 3 minutes and 3 minutes after 7 days) ,and group 3(initially for 5 minutes and 3 minutes after 7 days)  were faster than the control group. Also, the height average of the mature plants of

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Solution for Multi-Objective Optimisation Master Production Scheduling Problems Based on Swarm Intelligence Algorithms
...Show More Authors

The emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (13)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Using fuzzy logic for estimating monthly pan evaporation from meteorological data in Emara/ South of Iraq
...Show More Authors

Evaporation is one of the major components of the hydrological cycle in the nature, thus its accurate estimation is so important in the planning and management of the irrigation practices and to assess water availability and requirements. The aim of this study is to investigate the ability of fuzzy inference system for estimating monthly pan evaporation form meteorological data. The study has been carried out depending on 261 monthly measurements of each of temperature (T), relative humidity (RH), and wind speed (W) which have been available in Emara meteorological station, southern Iraq. Three different fuzzy models comprising various combinations of monthly climatic variables (temperature, wind speed, and relative humidity) were developed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (17)
Scopus Crossref