Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated under four expressions depending on the type of gene sub-ontology. To demonstrate the performance of the proposed evolutionary based complex detection algorithm, the Saccharomyces Cerevisiae (yeast) PPI network is used in the evaluation. The results reveal that the proposed algorithm achieves more accurate complex structures than the counterpart heuristic algorithms and the canonical evolutionary algorithm based on the topological-aware mutation operator.
The idea of this research is the basis of the role exercised by the dimensions of performance management (Performance Planning- performance evaluation- improve the performance and development- feedback - Review and Performance Monitor) In order to achieve the success Organizational Is through the (strategic vision- the operational activity- development of the company- selection of personnel- the company's culture- Leadership and Management- Personal Development - Assessment and Review).And The research aims to identify the extent of the responsibility of performance management in achieving success Organizational through main hypotheses branched out by the sub-hypotheses to knowing out the&nbs
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreAbstract
In this work, the plasma parameters (electron temperature (Te), electron density( ne), plasma frequency (fp) and Debye length (λD)) have been studied by using the spectrometer that collect the spectrum of Laser produce CdTe(X):S(1-X) plasma at X=0.5 with different energies. The results of electron temperature for CdTe range 0.758-0.768 eV also the electron density 3.648 1018 – 4.560 1018 cm-3 have been measured under vacuum reaching 2.5 10-2 mbar .Optical properties of CdTe:S were determined through the optical transmission method using ultraviolet visible spectrophotometer within the r
... Show MoreBackground: Emergency contraception (EC) is a general term used to describe drugs and devices that are utilized to prevent pregnancy following unprotected intercourse or in the event of contraceptive failure. This postcoital birth-control option is available by means of hormonal pills or copper-bearing intrauterine device.Objectives: The objectives of the study were to assess the women's knowledge regarding EC, to compare the knowledge of school teachers with other women in the community, as well as assessing the pre-post test knowledge of teachers.Type of the study: A cross sectional and quasi- experimental study.Methods: It was carried out in Duhok during the period from 20th of November 2014 to 6th of January 2015. A Simple and system
... Show MoreWe propose a system to detect human faces in color images type BMP by using two methods RGB and YCbCr to determine which is the best one to be used, also determine the effect of applying Low pass filter, Contrast and Brightness on the image. In face detection we try to find the forehead from the binary image by scanning of the image that starts in the middle of the image then precedes by finding the continuous white pixel after continuous black pixel and the maximum width of the white pixel by scanning left and right vertically(sampled w) if the new width is half the previous one the scanning stops.
This study investigates the impact of spatial resolution enhancement on supervised classification accuracy using Landsat 9 satellite imagery, achieved through pan-sharpening techniques leveraging Sentinel-2 data. Various methods were employed to synthesize a panchromatic (PAN) band from Sentinel-2 data, including dimension reduction algorithms and weighted averages based on correlation coefficients and standard deviation. Three pan-sharpening algorithms (Gram-Schmidt, Principal Components Analysis, Nearest Neighbour Diffusion) were employed, and their efficacy was assessed using seven fidelity criteria. Classification tasks were performed utilizing Support Vector Machine and Maximum Likelihood algorithms. Results reveal that specifi
... Show MoreTo achieve excellence in the quality of performance in school sports administration, which has suffered a lot of problems and constraints on the administrative system, supervision and education level as well as the regulatory environment and available resources available and contribute to the provision of some processors and overcome difficulties to participate in the formation of the individual good of itself and society through sports activities. Hence the importance came this study to create a reference to the quality of the performance criteria school sports from the perspective of supervisors (specialists and technicians) in the districts of breeding Baghdad, to be of help to all those involved in school sports and maintaining an excep
... Show MoreIn this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show More