In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and hard optimization problem. One of the main difficulties in identifying overlapping protein complexes is the accuracy of the partitioning results. In order to accurately identify the overlapping structure of protein complexes, this paper has proposed an overlapping complex detection algorithm termed OCDPSO-Net, which is based on PSO-Net (a well-known modified version of the particle swarm optimization algorithm). The framework of the OCDPSO-Net method consists of three main steps, including an initialization strategy, a movement strategy for each particle, and enhancing search ability in order to expand the solution space. The proposed algorithm has employed the partition density concept for measuring the partitioning quality in PPI network complexes and tried to optimize the value of this quantity by applying the line graph concept of the original graph representing the protein interaction network. The OCDPSO-Net algorithm is applied to a Collins PPI network and the obtained results are compared with different state-of-the-art algorithms in terms of precision ( ), recall ( ), and F-measure ( ). Experimental results confirm that the proposed algorithm has good clustering performance and has outperformed most of the existing recent overlapping algorithms. .
It is suitable to use precast steel-concrete composite beams to quickly assemble a bridge or a building, particularly in isolated regions where cast-in-situ concrete is not a practical option. If steel-concrete composite beams are designed to allow demountability, they can also be extremely useful in the aftermath of natural disasters, such as earthquakes or flooding, to replace damaged infrastructure. Furthermore, rapid replacement of slabs is extremely beneficial in case of severe deterioration due to long-term stressors such as fatigue or corrosion. The only way to rapidly assemble and disassemble a steel-concrete composite structure is to use demountable shear connectors to connect/disconnect the steel beams to/from the concrete slab. I
... Show MoreThe goal of this experimental study is to determine the effects of different parameters (Flow rate, cuttings density, cuttings size, and hole inclination degree) on hole cleaning efficiency. Freshwater was used as a drilling fluid in this experiment. The experiments were conducted by using flow loop consist of approximately 14 m (46 ft) long with transparent glass test section of 3m (9.84 ft.) long with 4 inches (101.6 mm) ID, the inner metal drill pipe with 2 inches (50.8 mm) OD settled with eccentric position positive 0.5. The results obtained from this study show that the hole cleanings efficiency become better with high flow rate (21 m3/hr) and it increase as the hole inclination angles increased from 60 to 90 degree due to dominated
... Show MoreIn the present work, the critical micelle concentration (CMC) of the solution of Sodium dodecyl sulfate (SDS) as anionic surfactant, Cocamidopropyl Betaine (CAPB) as amphoteric surfactant, and their mixture have been determined using surface tension and conductivity measurements at a temperature range 293 -323 K. The adsorption and thermodynamic micellization parameters (?G?m, ?G?ads, ?max ,Amin,?cmc ) for individual surfactants was calculated. Rosen model which is focuses on the adsorbed mixed surfactant film at the air/solution interface was used to calculate the interaction parameter ( ?? ) at the interface and the activity coefficients g1 and g2. The results indicate that the CMC of the individual surfactants was affected by
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreIn this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes
... Show MoreIn this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreAmong more than 200 different human papilloma viral genotypes, the association of low oncogenic risk-HPV genotypes have been recognized with a variety of oral, oropharyngeal, nasopharyngeal benign tumors as well as non-neoplastic polyposis and papillomas and adenoid hypertrophy. This prospective case- control study aims to determine the rate of DNA detection of HPV genotype 6/11 in nasopharyngeal adeno- tonsillar tissues from a group of patients subjected to adenoctomy for adenoid hypertrophy . A total number of nasopharyngeal adeno-tonsillar tissue specimens from pediatric patients with adenoid hypertrophy were enrolled; 40 nasopharyngeal adeno-tonsillar tissues from patients with adenoid hypertrophy, and 20 normal nasal tissue specimen
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More