Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust EA with more biological consistency. For this purpose, a new crossover operator is suggested where biological information in terms of both gene semantic similarity and protein functional similarity is fed into its design. To reflect the heuristic roles of both semantic and functional similarities, this paper introduces two gene ontology (GO) aware crossover operators. These are direct annotation-aware and inherited annotation-aware crossover operators. The first strategy is handled with the direct gene ontology annotation of the proteins, while the second strategy is handled with the directed acyclic graph (DAG) of each gene ontology term in the gene product. To conduct our experiments, the proposed EAs with GO-aware crossover operators are compared against the state-of-the-art heuristic, canonical EAs with the traditional crossover operator, and GO-based EAs. Simulation results are evaluated in terms of recall, precision, and F measure at both complex level and protein level. The results prove that the new EA design encourages a more reliable treatment of exploration and exploitation and, thus, improves the detection ability for more accurate protein complex structures.
Listeria spp. is one of the abortion causative agents in animals, especially in ruminants. This work aimed to detect Listeria spp. in milk and aborted fetus cows in Iraq. A total of 50 organ samples from aborted cow fetuses, including (brain, liver, and spleen), and 50 milk samples from the same aborted cows were collected from Baghdad farms, Iraq from (October 2023- March 2024). The bacteria were identified by conventional culture methods, biochemical tests, and the VITEK2 compact system, followed by molecular confirmation. The antimicrobial resistance pattern assay was performed using the disc diffusion method against eight antibiotic agents, and the L.monocytogenes virulence genes involving prfA,actA, and hylA genes were detected using t
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny
... Show MoreTwo EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
Background: Ultrasound is a valuable tool for evaluating fetal problems throughout pregnancy. Amniotic fluid anomalies have been associated with unfavorable maternal, fetal, and obstetrical outcomes. Objective: To determine the effect of echogenic amniotic fluid during term pregnancy on the presence of meconium stain liquor and pregnancy outcome. Methods: A cross-sectional study was conducted on 1080 term pregnant women who visited Al-Elwiya Maternity Teaching Hospital from May 1st, 2021, to May 1st, 2023. Ultrasound was used to analyze echogenic amniotic fluid and turbid liquor. The liquor state was tested either after an artificial membrane rupture in the vaginal delivery trial or during a cesarean section. Results: Echogenic amni
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreAs a result of the entry of multinationals companies in Iraq for investing in the joint projects through conducting agreements and contracts for work on important and strategic projects to get the necessary funds and various experiences which characterize the foreign participant sides that Iraq currently needs them and because of the non-applying the accounting processing stipulated in the unified accounting system in addition to the absence of a local accounting bases as well as the default of the participant contracts on indicating the accounting methods about those projects which are considered one of the bases that enables auditors in the public sector to depend on it, thus the research paper deals with studying an
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show More