Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust EA with more biological consistency. For this purpose, a new crossover operator is suggested where biological information in terms of both gene semantic similarity and protein functional similarity is fed into its design. To reflect the heuristic roles of both semantic and functional similarities, this paper introduces two gene ontology (GO) aware crossover operators. These are direct annotation-aware and inherited annotation-aware crossover operators. The first strategy is handled with the direct gene ontology annotation of the proteins, while the second strategy is handled with the directed acyclic graph (DAG) of each gene ontology term in the gene product. To conduct our experiments, the proposed EAs with GO-aware crossover operators are compared against the state-of-the-art heuristic, canonical EAs with the traditional crossover operator, and GO-based EAs. Simulation results are evaluated in terms of recall, precision, and F measure at both complex level and protein level. The results prove that the new EA design encourages a more reliable treatment of exploration and exploitation and, thus, improves the detection ability for more accurate protein complex structures.
Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the
... Show MoreIn many video and image processing applications, the frames are partitioned into blocks, which are extracted and processed sequentially. In this paper, we propose a fast algorithm for calculation of features of overlapping image blocks. We assume the features are projections of the block on separable 2D basis functions (usually orthogonal polynomials) where we benefit from the symmetry with respect to spatial variables. The main idea is based on a construction of auxiliary matrices that virtually extends the original image and makes it possible to avoid a time-consuming computation in loops. These matrices can be pre-calculated, stored and used repeatedly since they are independent of the image itself. We validated experimentally th
... Show MoreA charge transfer complex formed by interaction between nitron as electron donor with curcumin(1 ) as electron acceptor in ethanol at the temperature of theroom to form a colored complex. The optimum conditions of complex formation were investigated by Univariate method. The linearity range of complex was (3.124– 53.11) μg.mL-1 at 442 nm with molar absorptivity (1858.33) L.mol-1.cm-1, Sandell's sensitivity (0.1681μg.cm-2), and with a correlation coefficient (0.9935). Both modified attapulgite and modified attapulgite – complex have been characterized by using , FTIR, SEM, AFM, and XRD. Theadsorption behaviourof complex onto the modified attapulgite has been researchedthrough the variation of the parameters like the adsorbent weight, p
... Show MoreThe design of this paper is to find the possible correlation of Epstein Barr virus infection ina group of Iraqi women with cervical carcinoma though detection of Latent Membrane Protein 1 (LMP1) in these cervical tissues. Paraffinized blocks of two groups were included. The first sample of 30 cervical carcinomatous tissues and 15 biopsies from an apparently normal cervical tissues. All the samples were sectioned on a positive charged slides with 4 mm – thickness then submitted for immunohistochemical (IHC) staining to detect viral LMP1 expression. Sixty three percentage (19 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant ass
... Show MoreObjective(s): To measure serum C-reactive protein (CRP) titer as a predictive diagnosis of acute hepatitis C virus (HCV)
infection.
Methodology: Two hundred and ten patients with acute HCV infection and 234 apparently healthy individuals as
control group were enrolled in this study in Baghdad medical city (Teaching Laboratories). The patents include
74(35.2%) females and 136 (64.8%) males with mean age (27±16.5) years. The control group includes 114 (48.7%)
females and 120 (51.3%) males with mean age (26±5.8) years. Blood samples were collected from out patients from
Alfadul in Baghdad city. Sera were separated and stored at 20 0
C. The diagnosis of acute HCV infection was based on
detection of HC Ag and anti- H
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreThirty nine (12.8%) isolates of Staphylococcus aureus were isolated from 304 healthy human (Nasal swabs). It was found that percentage of males that have S. aureus is more than female's percentage. These isolates (39) were tested with different tests. Twenty seven isolates (69.23 %) were positive for Staphylococcus protein —A (SPA) ,thirty seven ( 94.8 %) were positive for tube coagulase , thirty five ( 89.7 % ) were positive with clumping factor and thirty two ( 82.05 %) had 13 — hemolytic on blood agar. It was found that 100% of the isolates (39 isolates) were positive with one, two or three tests (tube coagulase, clumping factor and SPA).
A three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show More