Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solving NP-hard problems. The main aim of this study is to make a close examination of the performance of the EAs where modularity and modularity density are selected as two different objective functions. Topology-based modularity and topology-based modularity density are designed to examine the detection ability of the EAs and to compare their performance. To conduct the experiments, two yeast Saccharomyces cerevisiae PPINs are used and evaluated under nine evaluation metrics. The results reveal the potential impact of the topology-based modularity density to outperform the counterpart modularity functions in almost all evaluation metrics.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreSilybum marianum, from which silymarin (SM) is extracted, is a medicinal herb. In the Biopharmaceutics Classification System, it is of the class II type, meaning it is almost completely insoluble in water. It has a number of therapeutic properties, including anti-inflammatory as well as properties that promote wound healing.
This research target is to promote the dissolution and solubility of SM by employing a technique called solid dispersion and then incorporating the formula of solid dispersion into a topical gel that can be used for wound healing.
Solid dispersion is a technique used to enhance solubility and dissolve pharmaceuticals that are not water-soluble. This method is widely used because of its low cos
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MoreThe research deals with the concept of rationalization of consumption, which is legitimately legitimized, by indicating the permissibility of consumption and its limits in Islam, the legitimate aspects of spending and its controls, and the concept of development in the Islamic economy. The researcher followed the descriptive method by presenting the legal texts and jurisprudential opinions and linking them to contemporary economic problems.The research has reached several conclusions, the most important of which is that the goal of Islam in relation to consumption is to inform the Muslim of the amount of economic maturity, and the truth of alms is good in money and religion. It is necessary for achieving maturity that both means
... Show MoreAnew mixed compound complexes derived from 2-phenyl-2-(o-tolylamino) Acetonitrile as primary ligand (L1) and histidine (L2) as secondary ligand have been prepared and characterized by conventional techniques, elemental microanalysis (C.H.N), Fourier transform infrared, ultra violet-visible spectra, , flame atomic absorption, molar conductivity, magnetic susceptibility measurement and 1H-NMR spectra. From IR data which appear chelating behavior of the amino acid ligand (L2) toward transition metal ions is via carboxylate oxygen, amino nitrogen and imidazol nitrogen as tridentate ligand while second ligand (L1) chelating through N-nitrile and N-aniline, according to all above technics the octahedral shapes were expected for these complexes as
... Show MoreBackground: Poly (methyl methacrylate) has been widely utilized for fabrication of dentures for many years as it has good advantages but not achieved all demands of the mechanical properties such as low transverse strength, low impact strength, low surface hardness, high water solubility and high water sorption. Material and method: To provide bonding between ZrO2 nanoparticles and PMMA matrix, the ZrO2 Nano-fillers were surface-treated with a saline coupling agent. Plasma surface treatment of polyethylene (PE) fiber was done to change surface fiber by using DC- glow discharge system. For characterization of interring any functional groups, the (FTIR) spectrum were done .then the mechanical properties studied to choose the appropriate perc
... Show MoreOne of the critical factors for dental implant success is accurate clinical and radiological assessment. Cone-beam computed tomography systems (CBCT) allow surgeons to determine the quality and quantity before surgery, aiding in treatment planning. This study highlights the importance of such an assessment Materials and Methods A total of 40 patients were referred to CBCT scanning for pre-dental implant assessment in the Oral and Maxillofacial Radiology department at Al-Shaheed Gazi Al Hariri Hospital from 2021 to 2022. The patients were between 18 and 50 years old. All data were analyzed with on-demand 3D software (Kavo OP 3D: Cone Beam 3D imaging Germany). Results: Regarding the ridge shape: In the upper anterior and posterior regions, th
... Show More