Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust EA with more biological consistency. For this purpose, a new crossover operator is suggested where biological information in terms of both gene semantic similarity and protein functional similarity is fed into its design. To reflect the heuristic roles of both semantic and functional similarities, this paper introduces two gene ontology (GO) aware crossover operators. These are direct annotation-aware and inherited annotation-aware crossover operators. The first strategy is handled with the direct gene ontology annotation of the proteins, while the second strategy is handled with the directed acyclic graph (DAG) of each gene ontology term in the gene product. To conduct our experiments, the proposed EAs with GO-aware crossover operators are compared against the state-of-the-art heuristic, canonical EAs with the traditional crossover operator, and GO-based EAs. Simulation results are evaluated in terms of recall, precision, and F measure at both complex level and protein level. The results prove that the new EA design encourages a more reliable treatment of exploration and exploitation and, thus, improves the detection ability for more accurate protein complex structures.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreEstimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling the Symmetric gray scale texture image and estimating by using
... Show MoreThe research discusses the problem of salaries in the public sector in terms of the process of analyzing its structure and the possibility of benefiting from the information provided by the analysis process for the strategic planning process, and the General Authority for Groundwater has been adopted and one of the formations of the Ministry of Water Resources, which is centrally funded, to represent the salary structure of its employees (1117) employees be a field of research, as the salary structure in it was analyzed for the period between (2014-2019) using the quantitative approach to analysis and by relying on a number of statistical tools in the analysis process, including mathematical circles, upper limits, lower limits, p
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreThis research aims to numerous risks to the portfolio of the insurance company that arise from practicing the activity in general, and the risks arising from insurance contracts in particular, and what is the role of the company in the disclosure to help users (such as owners) to understand and concentration of risks in the financial reporting and identifying movable risks size to reinsurers that may affect the solvency of the portfolio and makes them at a given moment required to fulfill the obligations towards policyholders outweigh the financial capacity, which leads to stumble or bankruptcy.
So I sought this research is to identify the extent of the obligation to disclose the accounting for this risk and the extent of their i
... Show MoreOxazepine [1] is non – nomologous seven –member ring that contain two netroatoms (oxygen and nitrogen ). Meanwhile diazepine [2] contains to nitrogen atoms in seven – member ring.
Diazepam (valium) [3] is used to relive anxiety tension associated with anxiety disorder and muscle spasms (1, 2, 3
... Show MoreThis study deals with segmenting the industrial market as an independent variable and targeting the industrial market as a dependent variable. Since the industrial sector represents one of the most important fundamental pillars to build the economies of countries and their development , the Iraqi industrial sector was chosen as a population for the study . Based on measuring the study variables , identifying them and testing the correlation and effect on each other , the study reached a group of findings:
1- Increasing the level of availability of study variables inside the companies “The study sample”.
2- There is a correlation between the independent v
... Show MoreOn of the direct causes which led to the global financial crisis 2008 is decrease or collapse in liquidity of large financial institutions which is reflected on investments of a considerable number of institutions and persons.
This study aim's through out its three sections to explain the disclosure level of financial institutions which affected by Financial Crisis from liquidity information which explained in the statement of cash flow according to Timeliness and Completeness.
The study concluded an important result the company of research sample was disclosure in Timeliness and Completeness from all of accounting information is related in liquidity or that related in result of operations and financial position. The more
... Show More