Preferred Language
Articles
/
BxeIN48BVTCNdQwCHGO-
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturbation mechanism of both crossover and mutation operators is designed based on the direct gene ontology annotations and Jaccard similarity coefficients for the proteins. The results on yeast Saccharomyces cerevisiae PPIN provide a useful perspective that the functional domain of the proteins, as compared with the topological domain, is more consistent with the true information reported in the Munich Information Center for Protein Sequence (MIPS) catalog. The evaluation at both complex and protein levels reveals that feeding the components of the EA with biological information will imply more accurate complex structures, whereas topological information may mislead the algorithm towards a faulty structure.

Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Analysis of a harvested discrete-time biological models
...Show More Authors

This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.

Scopus (6)
Scopus
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Pharmaceutical Sciences And Research
Synthesis and Biological Activity of New Imidazaldinone Derivatives
...Show More Authors

A research include of synthesized five member ring, which has been synthesized by condensation of 2-(1-(4- hydroxyphenyl) ethylidene)hydrazine-1-carbothioamide[I] with α-chloro ethylacetate in sodium acetate (fused) to form ethyl 2-(4-(1-((4-oxo-2-thioxopyrrolidin-3-ylidene)hydrazono) ethyl)phenoxy)acetate [II]. After that reacted [II]with hydrazine hydrate to resulting compound [III]. Compound [III] was refluxed with 4-aminobenzoicacid in excess of phosphorus oxy chloride give compound [IV],the later compound [IV] interact with acetyl acetone or ethylacetoacetate give to pyrazole and pyrazoline derivatives[V],[VI]. While when reacted with different aromatic aldehydes and one ketone consistence Schiff base derivatives [VII]a-e . The FTIR a

... Show More
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Feb 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Manufacture of Feed Protein Concentrates from Local Fish That Are Not Suitable for Consumption
...Show More Authors
Abstract<p>The aim of this study is to know the effect of using locally manufactured fishmeal and its nutritional value note that its manufactured from uneconomical local fish are not for human consumption. Cyprinus carpio fed with three different diets levels of locally manufactured fishmeal at a rate of 0.03 and 0.05 of the body weight. For control treatment (C1), the second treatment (C2) and the third treatment (C3). It was found that the C3 was superior to the first two parameters, control (C1) and (C2), in most of the studied standards with a high significance level (P≥0.05). The average final weight of the fish in the third parameter (C3) was 7.75g. The daily growth rate (DGR) of the th</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Osseointegration effects of whey protein (histological and histomorphological observations): An experimental study on rabbits
...Show More Authors

Background: Whey protein is the green-yellow colored, liquid portion of the milk, and it is also called the cheese serum, it is obtained after the separation of curd, during the coagulation of the milk. It contains a considerable amount of α-helix pattern with an evenly distributed hydrophobic and hydrophilic as well as basic and acidic amino acids along with their polypeptide chain. The major whey protein constituents include β-lactoglobulin (β-LG),α-lactalbumin (α-LA), immunoglobulins (IG), bovine serum albumin (BSA), bovine lactoperoxidase (LP), bovine lactoferrin (BLF) and minor amounts of a glycol macro peptide (GMP). Osseointegration can be defined as a process that is immune driven which leads to the formatio

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Nov 23 2020
Journal Name
Advanced Science
Association of Fluorescent Protein Pairs and Its Significant Impact on Fluorescence and Energy Transfer
...Show More Authors

View Publication
Scopus (10)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Model of Wind Turbine Power Control System with Fuzzy Regulation by Mamdani and Larsen Algorithms
...Show More Authors

Abstract 

     The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of  the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Aug 11 2024
Journal Name
Al-salam Journal For Medical Science
A review of recent developments in pharmaceutical chemistry on biological evolution of tetrazole derivatives
...Show More Authors

This review sums up the developments in the biological activity of tetrazole active derivatives in recent days. Some of the deliberated derivatives of tetrazole are at present actively scientifically studied; some of them have biological activity that enables them to be studied further in the future as a drug for various biological activities. This review seeks to offer a comprehensive analysis of the efficacy and clinical advantage of biological activity for tetrazole derivatives.

View Publication
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Evaluation of Physical Chemical and Biological Characteristics of Underground Wells in Badra City, Iraq
...Show More Authors

The quality of groundwater should be improved by keeping safe water sources from contaminants in protective way by doing regular measuring and checkup before it supplied for usage. Private Wells do not receive the same services that wells supplying the public do. Well owners are responsible for protecting their drinking water. This work was carried out in Badra city, Iraq from December 2017 to May 2018, six wells water were investigated to determine the general characteristics of wells as well as studying the effect of environmental factors on the quality of water. The average of six wells were eleven parameters that is out of permissible limits were EC, Sal., Alk., TH, TDS, Na, Ca, Cl, SO4, Fe, Zn (4402-5183 /cm, 2.76-3.9 ppt

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref