Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust EA with more biological consistency. For this purpose, a new crossover operator is suggested where biological information in terms of both gene semantic similarity and protein functional similarity is fed into its design. To reflect the heuristic roles of both semantic and functional similarities, this paper introduces two gene ontology (GO) aware crossover operators. These are direct annotation-aware and inherited annotation-aware crossover operators. The first strategy is handled with the direct gene ontology annotation of the proteins, while the second strategy is handled with the directed acyclic graph (DAG) of each gene ontology term in the gene product. To conduct our experiments, the proposed EAs with GO-aware crossover operators are compared against the state-of-the-art heuristic, canonical EAs with the traditional crossover operator, and GO-based EAs. Simulation results are evaluated in terms of recall, precision, and F measure at both complex level and protein level. The results prove that the new EA design encourages a more reliable treatment of exploration and exploitation and, thus, improves the detection ability for more accurate protein complex structures.
According to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch
Cholesteryl ester transfer protein gene contains some single nucleotide polymorphisms, which have been associated with serum high-density lipoprotein concentration and other lipoproteins. This study is done for determining of cholesteryl ester transfer protein polymorphism and evaluate its effect on serum lipid profile concentrations in some hyperlipidemic patients compared with healthy subjects in Salah Al-din governorate-Iraq. Blood samples were taken from (90) patients suffering from hyperlipidemia, and (70) samples that were apparently healthy controls. Serum lipid concentrations were measured by enzymatic assays. The polymorphism was genotyped using polymerase chain reaction restriction fragment length polymorphism analysis.&n
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreChronic periodontitis (CP) is an inflammatory disease affecting tooth supporting structures in response to bacterial dental plaque causing irreversible tissue destruction. Cyclooxygenase-2 (COX-2) is an effective mediator in the pathogenesis of periodontitis. Polymorphisms in the COX-2 gene may contribute to its overexpression and increased disease susceptibility. To evaluate the association between -1195 A/G single nucleotide polymorphism (SNP) in the promotor area of the cyclooxygenase-2(COX-2) gene and severity of chronic periodontitis in a sample of Iraqi population. -1195A/ G COX-2 SNP was investigated in 70 chronic periodontitis (CP) cases and 30 healthy controls. CP cases composed of 2 subgroups (35 moderate CP cases and 35 severe CP
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.