Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreThe issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis study was designed to stand on the most important causes of contamination in sesarean section in women by the aerobic bacteria species the bacteria isolates were diagnosed in the Maternity and Children Hospital in the Qadsiya province and in the special clinics. Sixty five persent of women having cesarean operation were contaminated with different bacteria in different ratios. Staphylococcus aureus showed the higher percentage (62.4) , Pseudomonas.aerogenosa 18% , E.coli 9.5% and Proteus.spp (6,4%).While Streptococcus pyogens showed lowest percentage 3.6% . The results of antibiotic sensitivity test for all bacteria isolates showed Chloramphenicol and Ami
... Show MoreBigheaded carps (bighead carp, Hypophthalmichthys molitrix, and silver carp, Hypophthalmichthys nobilis) and their hybrids play an important ecological and economic role in their original habitat, while their introduced stocks may pose serious ecological risks. To address questions about the persistence and invasiveness of these fish, we need to better understand their population structures. The genetic structures of bigheaded carp populations inhabiting Lake Balaton and the Tisza River were examined with ten microsatellite markers and a mitochondrial DNA marker (COI). The Lake Balaton stock showed higher genetic diversity compared with the Tisza River stock. Based on hierarchical clustering, the Tisza population was characterized o
... Show MoreBackground: Dyslipidemia is defined as an abnormally high level of various lipids in the blood. It is considered a major risk for atherosclerosis and coronary artery disease. Genetic susceptibility can have a significant influence on the development and progression of dyslipidemia. ApoB-100 R3500Q mutation and ApoE variants are among those genetic risks for dyslipidemia. This study aims to assess the possible contribution of ApoB and ApoE variants on lipid profile among a group of early-onset ischemic heart disease (IHD) patients in comparison to a group of controls. Methods: Forty patients with dyslipidemia and early-onset IHD without chronic conditions likely to cause derangement of lipid levels were recruited to this case-control study
... Show MoreBackground. Gene polymorphisms affect etanercept’s pharmacokinetics, pharmacodynamics, and side effects. This effect is evidenced by the extensive genetic variation in the drug’s targets. Objectives. This study aims to find the association between different genotypes of the promoter region of the TNF-α gene at -308G/A(rs1800629), -857C/T(rs1799724), -863 C/A(rs1800630), -1031 T/C (rs1799964), -806 C/T (rs4248158) and -376 G/A (rs1800750) and the side effects of ETN that occurred to Iraqi RA patients. Method. The trial included patients with rheumatoid arthritis who had been using ETN for at least six months. The participants were from the Baghdad Teaching Hospital Rheumatology Unit. The PCR was sequenced to determine the polymo
... Show MoreThe measurements and tests of the samples conducted in the laboratories of the College of Agriculture included isolating bio-fertilizers and testing the efficiency of isolates that fix atmospheric nitrogen and solubilize phosphorous compounds. Bacteria were isolated and identified from the rhizosphere soils of different plants collected from various agricultural areas. A total of 74 bacterial isolates were obtained based on the phenotypic characteristics of the developing colonies, as well as biochemical and microscopic traits. The results of isolation and identification showed that among the 74 bacterial isolates, there were 15 isolates of A. chroococcum, 13 of Az. lipoferum, 13 of B. megaterium, 10 of P. putida, 10 of Actinomycetes, and n
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.