Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated under four expressions depending on the type of gene sub-ontology. To demonstrate the performance of the proposed evolutionary based complex detection algorithm, the Saccharomyces Cerevisiae (yeast) PPI network is used in the evaluation. The results reveal that the proposed algorithm achieves more accurate complex structures than the counterpart heuristic algorithms and the canonical evolutionary algorithm based on the topological-aware mutation operator.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Acute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro
... Show MoreAnkylosing spondylitis (AS) is a common, highly heritable inflammatory arthritis affecting primarily the spine and pelvis. This study was aimed to investigate the relationship between the rs27044 polymorphism in Endoplasmic reticulum aminopeptidase-1 (ERAP-1) with the susceptibility and severity of AS correlated with some biochemical markers such as hematological parameter (Erythrocytes sedimentation rate (ESR)) and immunological parameters (C-reactive protein (CRP), Human leukocyte antigen-B27 (HLA-B27), Interlukin-6 (IL-6) and Interlukin-23 (IL-23)), and oxidative stress parameters (Glutathione (GSH) and Malondialdehyde (MDA)) in a sample of Iraqi population. A total of 60 blood samples were collected from AS patients requited Rhe
... Show MoreNecessary and sufficient conditions for the operator equation I AXAX n  ï€* , to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
The present study evaluates the effects of Ginkgo biloba extract as monotherapy on the glycemic status, insulin resistance (IR), body mass index (BMI), and visceral adiposity index (VAI), in addition to the inflammatory markers, oxidative status and leptin level in patients with metabolic syndrome in comparison with metformin.
The study is a randomized, double-blind pilot study conducted during the period May to September, 2020. Fifty patients were recruited in the study and they were allocated into two groups (25 per each group): Ginkgo biloba and Metformin groups, they received (120 mg Ginkgo biloba extract/ capsule) and (500 mg Metformin/ capsule) respectively; orally as a single dose for 90 days. Blood samples were taken at z
... Show MorePituitary adenomas are the anterior pituitary tumors. Patients with an Aryl Hydrocarbon Receptor-Interacting Protein (AIP) mutation (AIP- mut) tend to have more aggressive tumors occurring at a younger age. Single nucleotide polymorphisms (SNPs) in many studies have been related to metabolic comorbidities in the general population. Study aims investigated the role of AIP gene SNPs with susceptibility to acromegaly pituitary- adenoma, with levels of LH, FSH, TSH, Testosterone, IGF1,GH, FT4 , Prolactin hormones and blood sugar levels. The study was conducted on a group of acromegaly patients, including 50 patients) both Genders( with hyperplasia of the ends, and apparently healthy control group. Genotyping of
... Show More