Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solving NP-hard problems. The main aim of this study is to make a close examination of the performance of the EAs where modularity and modularity density are selected as two different objective functions. Topology-based modularity and topology-based modularity density are designed to examine the detection ability of the EAs and to compare their performance. To conduct the experiments, two yeast Saccharomyces cerevisiae PPINs are used and evaluated under nine evaluation metrics. The results reveal the potential impact of the topology-based modularity density to outperform the counterpart modularity functions in almost all evaluation metrics.
The nuclear matter density distributions, elastic electron scattering charge form
factors and root-mean square (rms) proton, charge, neutron and matter radii are
studied for neutron-rich 6,8He and 19C nuclei and proton-rich 8B and 17Ne nuclei. The
local scale transformation (LST) are used to improve the performance radial wave
function of harmonic-oscillator wave function in order to generate the long tail
behavior appeared in matter density distribution at high . A good agreement results
are obtained for aforementioned quantities in the used model.
Some Results on Fuzzy Zariski
Topology on Spec(J.L)
The main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show MoreAge, hypertension, and diabetes can cause significant alterations in arterial structure and function, including changes in lumen diameter (LD), intimal-medial thickness (IMT), flow velocities, and arterial compliance. These are also considered risk markers of atherosclerosis and cerebrovascular disease. A difference between right and left carotid artery blood flow and IMT has been reported by some researchers, and a difference in the incidence of nonlacunar stroke has been reported between the right and left brain hemispheres. The aim of this study was to determine whether there are differences between the right and left common carotid arteries and internal carotid arteries in patient
DBN Rashid, Al- Utroha Journal, 2018
Researching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation
... Show More