By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturbation mechanism of both crossover and mutation operators is designed based on the direct gene ontology annotations and Jaccard similarity coefficients for the proteins. The results on yeast Saccharomyces cerevisiae PPIN provide a useful perspective that the functional domain of the proteins, as compared with the topological domain, is more consistent with the true information reported in the Munich Information Center for Protein Sequence (MIPS) catalog. The evaluation at both complex and protein levels reveals that feeding the components of the EA with biological information will imply more accurate complex structures, whereas topological information may mislead the algorithm towards a faulty structure.
This study was conducted to detect C.sakazakii PIF and raw milk. Two hundred samples of PIF were taken from the infected hospital infants who used this type of milk and from the local markets in addition to 16 sample of raw milk were collected. The study is the first to report the isolation of C. sakazakii and Enterobacter spp. from raw milk in Iraq. The distribution of C.sakazakii and Enterobacter spp. among the presumptive isolates using Vitek-GN2 system gave 1/16(6.25%) isolates of C.sakazakii and 4/16 (25%) isolates of Enterobacter spp. Enterobacter spp. isolates include (E.cloacae ssp. cloacae and E.cloacae ssp. dissolvens, E.hormaechei, and E.ludwigii) that isolate from raw milk Differences in between percentages of each isolate perse
... Show MoreImproving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
Background: Acute myeloid leukemia (AML) is an adult leukemia characterized by rapid proliferation of undifferentiated myeloid precursors, leading to bone marrow (BM) failure and impaired erythropoiesis. The p53 tumor suppressor protein regulates cell division and inhibits tumor development by preventing cell proliferation of altered or damaged DNA. It orchestrates various cellular reactions, including cell cycle arrest, DNA repair, and antioxidant properties. Objectives: To investigate the relationship of P53 serum level with hematological findings, remission, and survival status in de novo AML patients. Methods: This is a cross-sectional study that enrolled 63 newly diagnosed de novo AML patients, and 15 sex- and age-matched healt
... Show MoreThe present study conducted on 30 female patients with osteoarthritis OA a attending Baghdad teaching hospital, in addition to 30 healthy females, all subjects were (35-65) year's old .Parameters were measured in the sera of patients group and healthy groups were interleukin -8 (IL-8) and high sensitivity C-reactive protein (hs-CRP).The results revealed a higher significant in all parameters of patients sera compared to healthy groups. Conclusion was obtained that IL-8 and hs- CRP were a markers or player inflammatory disease like osteoarthritis nodal
Background: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV). For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was follo
... Show MoreThe research aims to know the effectiveness of a training program based on multiple intelligence theory in developing literary thinking among students of the Arabic Language Department at Ibn Rushd School of Humanities and to achieve the goal of research, the Safaris Research Institute, and the research community of Arabic language students in the Faculty of Education the third section of Arabic Language: The research sample consists of (71) students. Divided into (35) students in the experimental group and (36) students in the control group, the researcher balanced between the two groups with variables (intelligence, testing of tribal literary thinking, and time age in months), and after using the T-test for two independent samples, the
... Show MoreIn this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators