Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust EA with more biological consistency. For this purpose, a new crossover operator is suggested where biological information in terms of both gene semantic similarity and protein functional similarity is fed into its design. To reflect the heuristic roles of both semantic and functional similarities, this paper introduces two gene ontology (GO) aware crossover operators. These are direct annotation-aware and inherited annotation-aware crossover operators. The first strategy is handled with the direct gene ontology annotation of the proteins, while the second strategy is handled with the directed acyclic graph (DAG) of each gene ontology term in the gene product. To conduct our experiments, the proposed EAs with GO-aware crossover operators are compared against the state-of-the-art heuristic, canonical EAs with the traditional crossover operator, and GO-based EAs. Simulation results are evaluated in terms of recall, precision, and F measure at both complex level and protein level. The results prove that the new EA design encourages a more reliable treatment of exploration and exploitation and, thus, improves the detection ability for more accurate protein complex structures.
ervical cancer is one of the most frequently diag nosed malignancies representing the fourth leading cause of cancer-related death in females’ worldwide, with approximately 500,000 new cases diagnosed and 280,000 deaths occurring each year. Mxi1, an antagonist of c-Myc, maps to human chromosome 10q24-q25, a region altered in a substantial fraction of prostate tumors, in prostate cancer, where a high frequency of loss and mutation of the MXI1 gene has been reported. The aim of present study was to find out the possible association of exon deletion of MXI1 gene with incidence of cervical abnormalities and cancers in some Iraqi married women. The present study include collection of 120 scraping cervical cells samples from women clinically di
... Show MoreDespite extensive investigations, an effective treatment for sepsis remains elusive and a better understanding of the inflammatory response to infection is required to identify potential new targets for therapy. In this study we have used RNAi technology to show, for the first time, that the inducible lysophosphatidylcholine acyltransferase 2 (LPCAT2) plays a key role in macrophage inflammatory gene expression in response to stimulation with bacterial ligands. Using siRNA- or shRNA-mediated knockdown, we demonstrate that, in contrast to the constitutive LPCAT1, LPCAT2 is required for macrophage cytokine gene expression and release in response to TLR4 and TLR2 ligand stimulation but not for TLR-independent stimuli. In addition, cells transfe
... Show MoreAnkylosing spondylitis (AS) represents one kind of advanced arthritis formed via inflammatory stimuli long-term in the spin‘s joints. Interleukin (IL)-29 (interferon- lambda1(IFN- λ1)), interleukin (IL)-28A (interferon- lambda 2 (IFN- λ2)) and interleukin (IL)-28B (interferon- lambda 3(IFN-λ3)) are three interferon lambda (IFN- λs) molecules that have recently been identified as new members of the IFN family. IL-28B expression in ankylosing spondylitis (AS) is not well understood. 150 male healthy controls ((HC) and 160 males with AS as patients group participated in this study. Serum level and gene polymorphism were assessed using an enzyme-linked immunosorbent assay and Sanger sequencing for IL-28B, respectively. The results showed
... Show MorePseudomonas aeruginosa is an opportunistic pathogen responsible for serious infections. At least three different exopolysaccharides, alginate, polysaccharide synthesis locus (Psl), and pellicle exopolysaccharide (Pel) make up the biofilm matrix in P. aeruginosa . The effect of temperature on the biofilm formation and gene expression was examined by microtiter plate and real-time quantitative polymerase chain reaction (qRT-PCR). To be able to determine the effect of temperature on biofilm formation and gene expression of P. aeruginosa, 303 clinical and environmental samples were collected. Pseudomonas aeruginosa was isolated from 61 (20.1%) and 48 (15.8%) of the clinical and e
... Show MoreThe High Power Amplifiers (HPAs), which are used in wireless communication, are distinctly characterized by nonlinear properties. The linearity of the HPA can be accomplished by retreating an HPA to put it in a linear region on account of power performance loss. Meanwhile the Orthogonal Frequency Division Multiplex signal is very rough. Therefore, it will be required a large undo to the linear action area that leads to a vital loss in power efficiency. Thereby, back-off is not a positive solution. A Simplicial Canonical Piecewise-Linear (SCPWL) model based digital predistorters are widely employed to compensating the nonlinear distortion that introduced by a HPA component in OFDM technology. In this paper, the genetic al
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.