Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological process, and cellular component is used to get the functional domain. The reliability of the proposed algorithm is examined against the algorithms proposed in the literature. To this end, a yeast protein-protein interaction dataset is used in the assessment of the final quality of the algorithms. To make fake negative controls of PPIs that are wrongly informed and are linked to the high-throughput interaction data, different noisy PPINs are created. The noisy PPINs are synthesized with a different and increasing percentage of misinformed PPIs. The results confirm the effectiveness of the extended evolutionary algorithm design to utilize the biological knowledge of the gene ontology. Feeding EA design with GO annotation data improves reliability and produces more accurate detection results than the counterpart algorithms.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreAbstract
The government spending in Iraq and witnessed the changes and developments, especially after 2003, which outweighed consumer spending at the expense of capital expenditure and increased support and diversity of trends towards improving pension conditions for member
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreA field study investigated the degree of need for managers working in the directories of education to develop their skills for the exercise of administrative empowerment, and it adopted the descriptive analytical approach. The research community, was determined which consisted of 126 principals, and the sample was selected with arte of randomly Statistics and by (100%) of the research community, as the number of respondents was (126) of managers working in the directories of education. A questionnaire was built which included 40 items distributed among the fields of study. Researchers verified its validity and reliability. The research data were analyzed using software (SPSS), the questionnaire was applied in the second semester of the a
... Show MoreWhoever contemplates the Qur'an and recites its texts finds that the Qur'an did not invent or invent words that were unknown before it. Rather, it is the language of the Qur'an which deals with all the matters of the saying. He chose the most honorable of the materials and connected them to the meaning. And in the places of prosperity or sweetness, we find his words easy, to go into the midst of the ills for which it is The Holy Quran chose vocabulary and structures without The son of Ajeeba was one of those distinguished by high taste and linguistic sciences. This ability helped him to analyze and draw, and to explain the ills for which he influenced the singular On the other, and installed on another, and to show the efforts of Ibn Aje
... Show MoreThis research aims to address the most recent international standard in the field of insurance contracts, the International Financial Reporting Standard (IFRS17) and the theoretical framework of the standard in addition to the most important characteristics of the standard (IFRS17), as well as to identify the paragraphs of the modern standard, with the challenges its application in general and the use of the approach (inputs - operations - outputs) to present the challenges of its application in the Iraqi environment and specifically in the environment of Iraqi insurance sector companies (government), the research is based on the main premise that the identification of the requirements for the application of the International Fin
... Show More Chapter One : the importance of research and the need for it .
He has developed the concept of the curriculum has evolved as other educational concepts . Because the world has become a small village due to modern technology and are used in various aspects of life , and the rapid communication between the world can be accessed easily and conveniently . And that the purpose of education citizens who create social functions which ones to keep the culture , upgrade and repair flaws, and aims to develop the capacity of the individual and the preparations in the footsteps of scientific and technological development .
- The goal of research : The research aims to:
1 . What is the
The aim of this research was to evaluate the level of ball control in basketball. There was a great weakness in ball control that affected the mastery of many skills that affect the success of the team. The researcher also found a lack in training programs concerning ball control. The researchers used (9) special tests for ball control out of (41) test applied on young basketball players were (86). The researchers concluded that: 1. Criteria were set for test results of ball control. 2. A level of criteria was set for test results of ball control.
