Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreAbstract
The aim of this research is to formulate a proposed strategy for developing graduate studies at King Khalid University to support the achievement of the Kingdom's vision (2030). The research used the descriptive survey approach. The research community consisted of all graduate students at King Khalid University. The research was conducted on a random sample included (623) Male and female students, this research relied on the questionnaire as the main tool for collecting its data. The results revealed that the research sample believes that all the proposals included in this research are very important for the development of postgraduate studies at King Khalid University to support the achievement of the K
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreThe aim of this study was to measure the effectiveness of a proposed program to develop the creative abilities of the students of Tabuk University and its impact on the creative output of the NEOM project. The sample of the study consisted of (50) university students divided into two groups: an experimental group of 25 students who receive the proposed training program, and control group of (25) students.
To achieve these objectives, the researcher designed and developed tools to collect the required data, which were verified their validity and reliability.
The descriptive statistics of mean, standard deviations, correlation coefficient, T test for the associated sample were used in the analysis of the results of th
... Show MoreThe development of technology used in computerized programs is considered on of the most important topics that is responsible for creating tools that can be used in the business environment, the audit profession is one of those professions that received this development. In order for this profession to be more effective, there must be a tool based on sound (correct) scientific basis that can be based upon to enhance the quality of auditing. The research also aims to propose a computerized program to plan the auditing process according to the methods appropriate to the working environment in the audit offices and companies in Iraq. The computerized program was applied to the research sample and the hypothesis of the research has been prov
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreAbstract
The research aimed to prepare an audit program focusing on the activities of municipal institutions related to the environmental dimension as one of the dimensions of sustainable development, and applying the program for the purpose of preparing an oversight report related to assessing the impact of the activities of municipal institutions on the environmental reality as the main channel through which municipal institutions contribute to achieving the part related to it. Among the requirements of sustainable development, the proposed program was prepared and applied to the institutions affiliated to the Directorate of Mu
... Show MoreHeuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show More