Due to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function. The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties. The modularity function and the formulated heuristics are then injected into the mechanism of a single objective Evolutionary Algorithm (EA) tailored specifically to tackle the problem, and thus, to identify possible complexes from PPI networks. In the experiments, different overlapping scores are used to evaluate the detection accuracy in both complex and protein levels. According to the evaluation metrics, the results reveal that the introduced heuristics have the ability to harness the accuracy of the existing modularity while identifying protein complexes in the tested PPI networks.
This study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreDiabetic nephropathy (DN) is a principle cause of microangiopathy and the main reason for kidney disease at the end stage in patients with type 2 diabetes mellitus (T2DM). This work aimed to study the relation of pentosidine with kidney injury in the case of diabetic nephropathy. This study included 75 patients suffering from T2DM and 75 apparently healthy subjects. The patients group was divided into three groups ((normoalbumin, microalbuminuria, and macroalbuminuria; 25 patients for each) on the basis of albumin-creatinine ratio (ACR) . The level of serum pentosidine was determined using an ELISA kit. The level of pentosidine was found to be significantly higher in DN patients than in the healthy group. Also, the results revealed a str
... Show MoreRecently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreAutoimmune hepatitis is an inflammatory disease and its incidence has been increasing. The features of hepatitis are the release of inflammatory cytokines, the elevation of AST and ALT, and hepatocyte apoptosis and necrosis. Concanavalin A considered as essential model represents the acute immune-mediated liver damage in rodents. Thymoquinone is well known herbal compound that exert hepatoprotective, anti-inflammatory, and antioxidant activity. In this study, we focus on the immunoregulatory and liver protective effect of thymoquinone in a mouse model of concanavalin A-induced liver injury.
Twenty-four male mice were randomly divided into four groups each containing six animals: Negative control group, concanavalin A model group,
... Show MoreThe present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show MoreThe steady state laminar mixed convection and radiation through inclined rectangular duct with an interior circular tube is investigated numerically for a thermally and hydrodynamicaly fully developed flow. The two heat transfer mechanisms of convection and radiation are treated independently and simultaneously. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C) methods. The finite difference approach with the Line Successive Over-Relaxation (LSOR) method is used to obtain all the computational results. The (B.F.C) method is used to generate the grid of the problem. A computer program (Fortr
... Show More