Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated under four expressions depending on the type of gene sub-ontology. To demonstrate the performance of the proposed evolutionary based complex detection algorithm, the Saccharomyces Cerevisiae (yeast) PPI network is used in the evaluation. The results reveal that the proposed algorithm achieves more accurate complex structures than the counterpart heuristic algorithms and the canonical evolutionary algorithm based on the topological-aware mutation operator.
The research discusses with organizational spirituality and its implications on the organizational performance in the General Company for Food Industries in Abu Ghraib (Baghdad). The aim of the research was to determine the contribution of organizational spirituality in the organizational performance of the surveyed company. In order to achieve the objectives of the research، two main hypotheses were adopted. Several sub-hypotheses centered on the relationship between organizational spirituality and organizational performance in terms of its dimensions (Meaning work، self-esteem، community affiliation،
... Show MoreIn this paper, we introduce and discuss an extended subclass〖 Ą〗_p^*(λ,α,γ) of meromorphic multivalent functions involving Ruscheweyh derivative operator. Coefficients inequality, distortion theorems, closure theorem for this subclass are obtained.
This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show More
The linguistic researcher reads a systematic crisis, idiomatic problems within the linguistic term coming to the Arab culture. Where most of them return back to problems of receiving these sciences which are represented by phenomena like the multiplicity linguistic term, disturbance translated idiomatic concept and its duality.
Aims of the research :
1-Initializing new textbooks to form linguistic project and Arabic linguistic theory.
2-Determination adjusted knowledge, concepts of Arabian heritage linguistics subject
3-Observation the causes of disturbance crisis of linguistic term and its relation to
... Show MoreThis study was carried out to describe the gene expression of the micro RNA 122a gene with the development of diabetes in Iraq. The difference in gene expression between patients and healthy controls was properly considered. In this study, blood was isolated from 121 individuals divided into two groups as follows: 80 samples of diabetic patients and 41 samples from a healthy control. miRNA was isolated and transformed into cDNA, and the expression of mi122a was measured by qRT-PCR. The researchers looked at the relationship between age and gender and the occurrence of diabetes, as well as how they compared to controls. When comparing the mean gene expression level (Ct) of patient groups to the corresponding Ct means in the control group, th
... Show MoreThe present study has three objectives: 1) to investigate the prevalence of complex nominals in economic discourse represented via the selected business news texts, 2) to shed some light on the most common translation errors made by second year students in the Department of Translation in rendering complex nominals into Arabic, and 3) to detect the possible causes behind such translation errors and suggest some translation tips which might sound helpful to the students of translation to find the most suitable translation equivalent. The present study is based on an empirical survey in which a selective analysis of someeconomic texts represented in business news texts is made. A corpus of 159 complex nominals was selected from seven busin
... Show MoreIn the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Polyethersulfone (PES) ultrafiltration membrane blending NaX zeolite crystals as a hydrophilic additive was examined for zinc (II) and lead ions Pb (II) removal from aqueous solutions. The effect of NaX zeolite content on the permeation flux and removal efficiency was studied. The results showed that adding zeolite to the polymer matrix enhanced the permeation flux. The permeation flux of all the zeolite/PES matrix membranes was higher than the pristine membrane. No significant improvement was observed in the removal of Zn (II) ions using all prepared membranes as the removal percentage did not raise above 29.2%. However, the removal percentage of Pb (II) ions was enhanced to 97% using a membrane containing 0.9%wt. zeolite. Also, it was
... Show More