The research deals with an evolutionary-based mutation with functional annotation to identify protein complexes within PPI networks. An important field of research in computational biology is the difficult and fundamental challenge of revealing complexes in protein interaction networks. The complex detection models that have been developed to tackle challenges are mostly dependent on topological properties and rarely use the biological properties of PPI networks. This research aims to push the evolutionary algorithm to its maximum by employing gene ontology (GO) to communicate across proteins based on biological information similarity for direct genes. The outcomes show that the suggested method can be utilized to improve the predictability of the complexes identified. The GO functional annotation of proteins as a heuristic guide is injected into the framework of single-objective evolutionary algorithms (EAs), while the complex detection community score (CS) model works as a fitness function in EAs. In the experiments, we analyzed the performance of our proposed algorithm when applied to the publicly accessible yeast protein networks. The results show a considerable improvement in the detection ability of complexes in the PPI network.
Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreAcute myeloid leukemia represents the most prevalent type of acute leukemia in adults. Mutations in the tumor protein (TP53) gene have been found in more than half of all human cancers. This study was done to investigate the relationship between TP53 gene expression and the appearance and progression of acute myeloid leukemia in Iraq. This study included 100 subjects, divided into 60 patients suffering from pre-diagnostic acute myeloid leukemia and 40 healthy individuals. The difference in TP53 gene expression between acute myeloid leukemia patients and healthy individuals has been investigated, and the gene expression of TP53 has been measured after extraction of total RNA at concentrations (15–83 n
... Show More In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm. The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThis study was aimed to analysis phylogenetic tree of the gene cpn60 in Acinetobacter baumannii that was identified in Baghdad. Study included collection two hundred specimens (fifty from UTI, fifty from wound infection , fifty from respiratory tract infection and fifty from otitis infections) . In primary laboratory diagnosis and confirmed by using VITEK- 2 Compact system, twenty isolates of this bacterium were indentified (10%) from total specimens. Extraction of geneteic material to detect target gene by amplification this target gene. DNA
sequencing of all isolates was done. Then alignment of sequencing in NCBI and draw phylogenetic tree by use Geneious 9 software among sequence of locally i
This study aims at detecting the differences in genotyping of coding region fusA gene in clinical isolates of Acinetobacter baumannii from Baghdad, Iraq. Collected two hundred clinical samples (50 samples from urine, 50 samples from wound, 50 samples from sputum and 50 samples from otitis infections). Laboratory diagnosis for bacterial isolates carried out by some biochemical tests and confirmed by using VITEK- 2 compact system. The results appeared that twenty isolates of Acinetobacter baumannii in all these samples. Genotyping study was performed of coding region fusA gene of the extracted genome of all bacterial isolates and used specific primers in achieved amplification process of this target gene. DNA sequencing of this gene and alig
... Show MoreUniversal image stego-analytic has become an important issue due to the natural images features curse of dimensionality. Deep neural networks, especially deep convolution networks, have been widely used for the problem of universal image stegoanalytic design. This paper describes the effect of selecting suitable value for number of levels during image pre-processing with Dual Tree Complex Wavelet Transform. This value may significantly affect the detection accuracy which is obtained to evaluate the performance of the proposed system. The proposed system is evaluated using three content-adaptive methods, named Highly Undetetable steGO (HUGO), Wavelet Obtained Weights (WOW) and UNIversal WAvelet Relative Distortion (UNIWARD).
The obtain
Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show MoreThe current research dealt with the development of sciences and arts over the course of human history, and the development of sciences with their natural and human trends are important areas in developing the knowledge and application base for industrial product design and design in its various fields. Bionic science is one of the sciences that works on applying biological methods and systems found in nature to study and design engineering systems and modern technology, and for industrial products to be highly efficient, durable and resistant to natural variables in daily life for use. The transfer of technology between life forms and industrial products is desirable because the processes of development at the level of science in general
... Show More