Preferred Language
Articles
/
ihYYv4sBVTCNdQwCM9q8
Finite State Automata Generator for DNA Motif Template as Preparation Step for Motif Mining
...Show More Authors

There are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif templates and offers novel algorithm to accomplish this. It is tested using many simple and compound motif templates of different sizes and various numbers of gaps that have unlimited ranges of intervals. The motifs sizes are up to 2M Bases. The motif templates include up to 2000 gaps and the interval of a gap is [1,100] up to [1, 1000000]. All of these cases were processed successfully.

Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
Comparative Transfer Learning Models for End-to-End Self-Driving Car
...Show More Authors

Self-driving automobiles are prominent in science and technology, which affect social and economic development. Deep learning (DL) is the most common area of study in artificial intelligence (AI). In recent years, deep learning-based solutions have been presented in the field of self-driving cars and have achieved outstanding results. Different studies investigated a variety of significant technologies for autonomous vehicles, including car navigation systems, path planning, environmental perception, as well as car control. End-to-end learning control directly converts sensory data into control commands in autonomous driving. This research aims to identify the most accurate pre-trained Deep Neural Network (DNN) for predicting the steerin

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Malaysian Journal Of Science
INVESTIGATION OF FAST NEURON ATTENUATION COEFFICIENTS FOR SOME IRAQI BUILDING MATERIALS
...Show More Authors

This research aims to improve the radiation shielding properties of polymer-based materials by mixing PVC with locally available building materials. Specifically, two key parameters of fast neutron attenuation (removal cross-section and half-value layer) were studied for composite materials comprising PVC reinforced with common building materials (cement, sand, gypsum and marble) in different proportions (10%, 30% and 50% by weight). To assess their effectiveness as protection against fast neutrons, the macroscopic neutron cross-section was calculated for each composite. Results show that neutron cross-section values are significantly affected by the reinforcement ratios, and that the composite material PVC + 50% gypsum is an effect

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Anais Da Academia Brasileira De Ciências
Morphological study for Accipitrid birds (Accipitridforms, Accipitridae) in Iraq; part two
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Causal Relationship between Forgiveness and Psychological Hardiness For University Students
...Show More Authors

The research aimed to identify the causal relationship between forgiveness and psychological hardness for university students, by answering the following questions: Does forgiveness cause psychological hardiness? Does psychological hardiness cause forgiveness? Is the relationship between the two variables a reciprocal relationship? The research sample consisted of (300) male and female students from the universities of Baghdad and Al-Mustansiriya University. To extract the psychometric properties of the two scales: forgiveness and psychological hardiness, a sample of (50) male and female students employed to repeat the test, making the six connections between the two research variables. To determine the causal relationship, The Pearson c

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Fatigue and Tensile Characteristics for Composite Materials Used in Prosthetic Socket
...Show More Authors

In this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Cutaneous And Aesthetic Surgery
Topical zinc sulphate (25%) solution: a new therapy for actinic keratosis
...Show More Authors

KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19

View Publication
Publication Date
Sat Mar 20 2021
Journal Name
Neuroquantology
XRD and Microscopic Images for Synthesis Graphite Nanoparticles by Oxidation Method
...Show More Authors

Graphite nanoparticles were successfully synthesized using mixture of H2O2/NH4OH with three steps of oxidation. The process of oxidations were analysis by XRD and optics microscopic images which shows clear change in particle size of graphite after every steps of oxidation. The method depend on treatments the graphite with H2O2 in two steps than complete the last steps by reacting with H2O2/NH4OH with equal quantities. The process did not reduces the several sheets for graphite but dispersion the aggregates of multi-sheets carbon when removed the Van Der Waals forces through the oxidation process.

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref