Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a local improvement operator to effectively discover community structure in the modular complex networks when employing the modularity density metric as a single-objective function. The framework of the proposed algorithm consists of three main steps: an initialization strategy, a movement strategy based on perturbation genetic operators, and an improvement operator. The key idea behind the improvement operator is to determine and reassign the complex network nodes that are located in the wrong communities if the majority of their topological links do not belong to their current communities, making it appear that these nodes belong to another community. The performance of the proposed algorithm has been tested and evaluated when applied to publicly-available modular complex networks generated using a flexible and simple benchmark generator. The experimental results showed the effectiveness of the suggested method in discovering community structure over modular networks of different complexities and sizes.
Escherichia coli (E. coli) is a frequent gram-negative bacterium that causes nosocomial infections, affecting more than 100 million patients annually worldwide. Bacterial lipopolysaccharide (LPS) from E. coli binds to toll-like receptor 4 (TLR4) and its co-receptor’s cluster of differentiation protein 14 (CD14) and myeloid differentiation factor 2 (MD2), collectively known as the LPS receptor complex. LPCAT2 participates in lipid-raft assembly by phospholipid remodelling. Previous research has proven that LPCAT2 co-localises in lipid rafts with TLR4 and regulates macrophage inflammatory response. However, no published evidence exists of the influence of LPCAT2 on the gene expression of the LPS receptor complex induced by smooth or rough b
... Show MoreAbstract: The aim of this study is to assess the effectiveness of 940 nm diode laser in comparison to Endoactivator in elimination of smear layer in terms of radicular dentin permeability and ultra-structural changes of root canal walls by SEM evaluation. Twenty-eight single-rooted extracted lower premolars were instrumented up to size X4 (protaper Next, Dentsaply) and divided into two experimental groups according to the irrigation system, G1; activated by EndoActivator and G2; activated by Diode laser 940 nm, CW mode, 1.7 W. Afterward, the roots were made externally impermeable, filled with 2%methylene blue dye, divided horizontally into three segments representing the apical, middle, and coronal thirds then examined under stereo- micr
... Show MoreThe main role of infill drilling is either adding incremental reserves to the already existing one by intersecting newly undrained (virgin) regions or accelerating the production from currently depleted areas. Accelerating reserves from increasing drainage in tight formations can be beneficial considering the time value of money and the cost of additional wells. However, the maximum benefit can be realized when infill wells produce mostly incremental recoveries (recoveries from virgin formations). Therefore, the prediction of incremental and accelerated recovery is crucial in field development planning as it helps in the optimization of infill wells with the assurance of long-term economic sustainabi
Taguchi experimental design (TED) is applied to find the optimum effectiveness of aqueous Red Pomegranate Peel (RPP) extract as a green inhibitor for the corrosion of mild steel in 2M H3PO4 solution. The Taguchi methodology has been used to study the effects of changing, temperature, RPP concentration and contact period, at three levels. Weight-loss measurements were designed by construction a L9 orthogonal arrangement of experiments. Results of the efficiencies of inhibition were embraced for the signal to noise proportion & investigation of variance (ANOVA). The results were further processed with a MINITAB-17 software package to find the optimal condition
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MorePathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show More