Begomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV)
By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreThe adsorption process of 5-Fluorouracil (5FU) drugs on Aluminum nitride nanotubes surface (AlNNTs) have been evaluated through density functional theory (DFT). The DFT results show that the interaction of AlNNTs with the F atoms of 5FU drugs is strong due to the fact that the amount of adsorption energy was about − 29.65 kcal.mol−1. Conversely, the interaction of the 5FU through O atoms with the AlNNTs was weaker due to the lower value of adsorption energy. Also, based on the values of Gibbs free energy, the 5FU adsorption on the surfaces of AlNNTs was spontaneous. In addition, based on natural bond orbital (NBO) analysis, the direction of charge transfer was from fluorine’s σ orbitals of the drug to nitrogen’s and aluminum’s n*
... Show MoreBackground: Healing of a tooth extraction socket is a complex process involving tissue repair and regeneration. It involves chemotaxis of appropriate cells into the wound, Transformation of undifferentiated mesenchymal cells to osteoprogenitor cells, proliferation and differentiation of committed bone forming cells, extracellular matrix synthesis, mineralization of osteoid, maturation and remodeling of bone. These cellular events are precisely controlled and regulated by specific signaling molecules. Some of these like transforming growth factor beta (TGF-?), vascular endothelial growth factor (VEGF), bone morphogenetic proteins (BMP) and insulin like growth factors (IGF) are well conserved proteins involved in the initial response to injur
... Show MoreFluorescent proteins (FPs) have revolutionised the life sciences, but the chromophore maturation mechanism is still not fully understood. Here we photochemically trap maturation at a crucial stage and structurally characterise the intermediate.
Breast cancer is the commonest cancer affecting women worldwide. Different studies have dealt with the etiological factors of that cancer aiming to find a way for early diagnosis and satisfactory therapy. The present study clarified the relationship between genetic polymorphisms of BRCA1 & BRCA2 genes and some etiological risk factors among breast cancer patients in Iraq. This investigation was carried out on 25 patients (all were females) who were diagnosed as breast cancer patients attended AL-Kadhemya Teaching Hospital in Baghdad and 10 apparently healthy women were used as a control, all women (patients and control) aged above 40 years. The Wizard Promega kit was used for DNA isolation from breast patients and normal individuals. B
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreSeveral Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show More