One of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed gene ontology-based mutation operator. The performance of the proposed EA to have a high quantity and quality of the detected complexes is assessed on two yeast PPINs and compared with two benchmarking gold complex sets. The reported results reveal the ability of modularity density to be more productive in detecting more complexes with high quality when teamed up with a gene ontology-based mutation operator.
2929-2933
The system of accounting information role in the success of the economic unit, whether for-profit or non-purposeful, and through the availability of financial reports of information accounting for quality properties in the financial reports, which are the final product of all departments, sections and other parties, including help in strengthen the decisions of the administration and operations of Information economic Unity. The municipalities of economic units, non-profit, which is characterized by certain characteristics, including the multiplicity of activities (service, productivity, construction) and multiple sources of access to resources, so the accounting information system that seeks to provide decision makers with information o
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreMotives: This study examines the integration of Feng Shui principles into urban public spaces to enhance social interaction, livability, and environmental harmony. The case study focuses on the Al-Arabi and Al-Washash neighbourhoods in Baghdad, exploring how spatial characteristics influence engagement and energy circulation (Qi) within the urban network. The motivation arises from deficiencies in connectivity, shading, greenery, and water features, which limit social and aesthetic vibrancy. Aim: The objectives are to evaluate spatial and social dynamics through the Feng Shui Public-Space Index (FS-PSI), Space Syntax analysis, and resident surveys, and to propose strategies using Feng Shui design proxies to improve energy flow, acce
... Show MoreThe purpose of this paper is to building a comprehensive quality scale for school sports activities from the standpoint of physical education teachers in the directorates of education in the Governorate of Baghdad. The researchers used the descriptive approach with the survey method because it is the most appropriate to the nature of the problem and to achieve the objectives of the research .The good selection of the sample will reduce sampling errors, which enhances the honesty and accuracy of the data, which is representative of the research community and is always linked to its representation of the community and the possibility of generalizing its results to the group from which it was taken, as it represents the research community with
... Show MoreResearch includes evaluation of projects implemented and which entered into trial operation period in accordance with the evaluation criteria and of (cost, quality and time) to determine the size deviations gap for the sample of projects during the years of assessment (2011-2012-2013-2014) of each of the three evaluation criteria, and then followed by a calculation the size of the overall gap to the problem based on the research problem to determine deviations from the specific implementation of each project by answering several questions to answer turns out the reasons for these deviations occur.
The importance of research Focus on the evaluation of received projects from contractors executing the projec
... Show MoreThe newly synthesized Schiff base ligand (E)-2-((2-phenylhydrazono)methyl)naphthalen-1-ol (phenyl hydrazine derivative), is allowed to react with each of the next mineral ion: Ni2+, Cu2+, Zn2+andCd2+successfully resulting to obtain new metal complexes with different geometric shape. The formation of Schiff base complexes and also the origin Schiff base is indicated using LC-Mass that manifest the obtained molar mass, FT-IR proved the occurrence of coordination through N of azobenzene and O of OH by observing the shifting in azomethines band and appearing of M-N and N-O bands. Moreover, we can also detect by such apparatus, the presence of aquatic water molecule inside the coordination sphere. UV-Vis spectra of all resultants reveale
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show More