In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and hard optimization problem. One of the main difficulties in identifying overlapping protein complexes is the accuracy of the partitioning results. In order to accurately identify the overlapping structure of protein complexes, this paper has proposed an overlapping complex detection algorithm termed OCDPSO-Net, which is based on PSO-Net (a well-known modified version of the particle swarm optimization algorithm). The framework of the OCDPSO-Net method consists of three main steps, including an initialization strategy, a movement strategy for each particle, and enhancing search ability in order to expand the solution space. The proposed algorithm has employed the partition density concept for measuring the partitioning quality in PPI network complexes and tried to optimize the value of this quantity by applying the line graph concept of the original graph representing the protein interaction network. The OCDPSO-Net algorithm is applied to a Collins PPI network and the obtained results are compared with different state-of-the-art algorithms in terms of precision ( ), recall ( ), and F-measure ( ). Experimental results confirm that the proposed algorithm has good clustering performance and has outperformed most of the existing recent overlapping algorithms. .
Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of b
... Show MoreThis paper presents the syntactic dimension of ditransitive verbs in terms of the universal theory of Role and Reference Grammar (RRG). This theory is syntactic in nature, but it also covers the semantic as well as the pragmatic aspects of any linguistic phenomenon. It assumes a universal framework through which syntactic constructions can be analyzed. However, the morphological structure that each language enjoys renders the universal treatment more complicated and can question the universal nature of such a theory. In this paper, an attempt is made to check if the universal tenet of the theory is maintained over two typologically different languages: English and Arabic in respect of the way that double-object constructions (DOCs)
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThe objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w
... Show MorePrevious data indicated the effectiveness of silibinin as intraocular pressure (IOP) - lowering agent. The present study was performed to evaluate the interaction of silibinin with pilocarpine or cyclopentolate in lowering IOP in normotensive rabbits. The effects of topically instilled silibinin hemisuccinate solution (0.75%) alone or adjunctly combined with 2% pilocarpine or 1% cyclopentolate on the IOP of normotensive rabbits were evaluated using indentation tonometry. The results showed that 0.75% solution of silibinin was found more potent than pilocarpine (2% drops) in lowering IOP of normotensive rabbits, while their combination results in longer duration of action. Moreover, the elevated IOP values produced by cyclopentolate (1%drops
... Show MorePrevious data indicated the effectiveness of silibinin as intraocular pressure (IOP) - lowering agent. The present study was performed to evaluate the interaction of silibinin with pilocarpine or cyclopentolate in lowering IOP in normotensive rabbits. The effects of topically instilled silibinin hemisuccinate solution (0.75%) alone or adjunctly combined with 2% pilocarpine or 1% cyclopentolate on the IOP of normotensive rabbits were evaluated using indentation tonometry. The results showed that 0.75% solution of silibinin was found more potent than pilocarpine (2% drops) in lowering IOP of normotensive rabbits, while their combination results in longer duration of action. Moreover, the elevated IOP values produced by cyclopentolate
... Show MoreThe effect of α-particle irradiation on the optical absorption in nuclear track detectors (LR115) has been studied. These detectors have been irradiated with different doses. The optical absorption has been measured using the ultraviolet-visible (UV-1100) spectroscopy, that irradiation results in shifting the peaks of the optical absorption. The values of Urbach energy have been calculated from the position of steady-state optical band gap energy, for a standard sample which was unirradiated with indirect influence, has been found 1.9 eV whereas its value after irradiation 1.98 eV. In case of the direct influence, it is found to be, respectively, before irradiation 1.98 eV and after irradiation 2.05 eV. From these results, we can
... Show MoreIntegrating Renewable Energy (RE) into Distribution Power Networks (DPNs) is a choice for efficient and sustainable electricity. Controlling the power factor of these sources is one of the techniques employed to manage the power loss of the grid. Capacitor banks have been employed to control phantom power, improving voltage and reducing power losses for several decades. The voltage sag and the significant power losses in the Iraqi DPN make it good evidence to be a case study proving the efficiency enhancement by adjusting the RE power factor. Therefore, this paper studies a part of the Iraqi network in a windy and sunny region, the Badra-Zurbatya-11 kV feeder, in the Wasit governorate. A substation of hybrid RE sources is connected to this
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show More