Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated under four expressions depending on the type of gene sub-ontology. To demonstrate the performance of the proposed evolutionary based complex detection algorithm, the Saccharomyces Cerevisiae (yeast) PPI network is used in the evaluation. The results reveal that the proposed algorithm achieves more accurate complex structures than the counterpart heuristic algorithms and the canonical evolutionary algorithm based on the topological-aware mutation operator.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThe Sebkha is considered the evaporative geomorphological features, where climate plays an active role. It forms part of the surface features in Mesopotamia plain of Iraqi, which is the most fertile lands, and because of complimentary natural and human factors turned most of the arable land to the territory of Sebkha lands. The use satellite image (Raw Data), Landsat 30M Mss for the year 1976 Landsat 7 ETM, and the Landsat 8 for year 2013 (LDCM) for the summer Landsat Data Continuity Mission and perform geometric correction, enhancements, and Subset image And a visual analysis Space visuals based on the analysis of spectral fingerprints earth's This study has shown that the best in the discrimination of Sebkha Remote sensing techniques a
... Show MoreThe kaizen is considered as one of the most important modern techniques which has been adopted by various economics entities especially manufacturing firms and its beginnings return to the middle of the earlier century that has been used by companies like Toshiba, Matsushita Electric, and Toyota. Which realized that these modern techniques would make a total change in the competitive environment and started qualifying and its staff in such away that enables them to go along with this unique environment. The continuous improvement (Kaizen) depends on the small continuous improvements in the product and the production operations during the production stage. Consequently, the research problem is represented in the improperly of the budg
... Show MoreIt is found that hypersensitive teeth have a larger number and wider patent tubules than those of non-sensitive teeth. Objective: The aim of this study is to compare between the effects of diode laser at different power densities, with and without sodium fluoride on the sealing of exposed dentinal tubules and dentin permeability. Materials and methods: 118 teeth were used. Samples were divided into three major groups. The first consisted of 100 teeth used for permeability test. The second consisted of 16 teeth for measuring external surface temperature elevation while irradiation. The third, in turn, consisted of one pair of teeth observed under SEM for dentine surface morphology analysis. Results: For dentin permeability measurement, th
... Show More