Preferred Language
Articles
/
DxeNN48BVTCNdQwCg2Or
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust EA with more biological consistency. For this purpose, a new crossover operator is suggested where biological information in terms of both gene semantic similarity and protein functional similarity is fed into its design. To reflect the heuristic roles of both semantic and functional similarities, this paper introduces two gene ontology (GO) aware crossover operators. These are direct annotation-aware and inherited annotation-aware crossover operators. The first strategy is handled with the direct gene ontology annotation of the proteins, while the second strategy is handled with the directed acyclic graph (DAG) of each gene ontology term in the gene product. To conduct our experiments, the proposed EAs with GO-aware crossover operators are compared against the state-of-the-art heuristic, canonical EAs with the traditional crossover operator, and GO-based EAs. Simulation results are evaluated in terms of recall, precision, and F measure at both complex level and protein level. The results prove that the new EA design encourages a more reliable treatment of exploration and exploitation and, thus, improves the detection ability for more accurate protein complex structures.

Scopus Crossref
Publication Date
Thu Mar 03 2022
Journal Name
Multimedia Tools And Applications
Boosting Marine Predators Algorithm by Salp Swarm Algorithm for Multilevel Thresholding Image Segmentation
...Show More Authors

View Publication
Scopus (53)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Using the Elzaki decomposition method to solve nonlinear fractional differential equations with the Caputo-Fabrizio fractional operator
...Show More Authors

The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Damage Detection and Assessment of Stiffness and Mass Matrices in Curved Simply Supported Beam Using Genetic Algorithm
...Show More Authors

In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
An Artificial Intelligence Algorithm to Optimize the Classification of the Hepatitis Type
...Show More Authors

Hepatitis is one of the diseases that has become more developed in recent years in terms of the high number of infections. Hepatitis causes inflammation that destroys liver cells, and it occurs as a result of viruses, bacteria, blood transfusions, and others. There are five types of hepatitis viruses, which are (A, B, C, D, E) according to their severity. The disease varies by type. Accurate and early diagnosis is the best way to prevent disease, as it allows infected people to take preventive steps so that they do not transmit the difference to other people, and diagnosis using artificial intelligence gives an accurate and rapid diagnostic result. Where the analytical method of the data relied on the radial basis network to diagnose the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 14 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Impact of MDR-1 Gene Polymorphism (rs1128503) on Response to Imatinib or Nilotinib in Iraqi Patients with Chronic Myeloid Leukemia: An Observational Study
...Show More Authors

Background: There is a significant molecular response to imatinib given at standard doses in individuals with chronic myeloid leukemia (CML) whose ABCB1 polymorphisms are present. Objective: To investigate the impact of the polymorphism in the ABCB1 gene rs1128503 on the effectiveness of nilotinib or imatinib therapy. Methods: From May 2022 until the end of January 2023, the current study was carried out in a single research institution, the National Center of Hematology, Baghdad Teaching Hospital at Medical City, Iraq. 76 people with chronic phase myeloid leukemia (CML-CP), who had previously received a diagnosis using the European Leukemia Net (ELN) criteria, enrolled in the trial. The PCR product was delivered to Macrogen Corpora

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-nahrain Journal Of Science
Adsorption of P-Aminodiphenylamine with Iodine Charge Transfer Complex on Surface Arundo Plant
...Show More Authors

charge transfer complex formed by interaction between the p- aminodiphenylamine (PADPA) as electron donor with iodine as electron acceptor in ethanol at 250C as evidenced by color change and absorption. The spectrum obtained from complex PADPA – Iodine shows absorptions bands at 586 nm. All the variables which affected on the stability of complex were studies such as temperature, pH, time and concentration of acceptor. The linearity of the method was observed within a concentration rang (10–165) mg.L-1 and with a correlation coefficient (0.9996), while the molar absorbitivity and sandell sensitivity were (4643.32) L.mol-1.cm-1 and (0.0943) μg.cm-2, respectively. The adsorption of complex PADPA–I2 was studied using adsorbent surfaces

... Show More
Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Complex thinking among secondary school student in accordance with the views of lipman
...Show More Authors

The current study has sought to identify the levels of the compound thinking among secondary school students basing and relying on the opinions of Lipman who sees that the compound thinking consists of creative thinking and critical thinking, In accordance with this point of view, researchers have resorted to build scale of the critical thinking in its final form of (28) item additionally to the adoption of Torrance for the creative thinking which was translated by sayed. Khairallah in 1981 after confirming psychometric Properties Of both scales and then collect scores of both scales and be the final score represented the level of the compound thinking that has been shown by the results of secondary school students they have no skill of

... Show More
View Publication Preview PDF