Preferred Language
Articles
/
rhh2dZQBVTCNdQwCdRhG
Overlapping Structure Detection in Protein-Protein Interaction Networks Using a Modified Version of Particle Swarm Optimization
...Show More Authors

In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and hard optimization problem. One of the main difficulties in identifying overlapping protein complexes is the accuracy of the partitioning results. In order to accurately identify the overlapping structure of protein complexes, this paper has proposed an overlapping complex detection algorithm termed OCDPSO-Net, which is based on PSO-Net (a well-known modified version of the particle swarm optimization algorithm). The framework of the OCDPSO-Net method consists of three main steps, including an initialization strategy, a movement strategy for each particle, and enhancing search ability in order to expand the solution space. The proposed algorithm has employed the partition density concept for measuring the partitioning quality in PPI network complexes and tried to optimize the value of this quantity by applying the line graph concept of the original graph representing the protein interaction network. The OCDPSO-Net algorithm is applied to a Collins PPI network and the obtained results are compared with different state-of-the-art algorithms in terms of precision ( ), recall ( ), and F-measure ( ). Experimental results confirm that the proposed algorithm has good clustering performance and has outperformed most of the existing recent overlapping algorithms. .

Scopus Crossref
View Publication
Publication Date
Fri Oct 03 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
INTERACTION EFFECTS OF HYDRODYNAMICALLY FULLY DEVELOPED PRIMARY FLOW AND SECONDARY FLOW IN THE THERMAL ENTRANCE REGION OF ANNULAR DUCT
...Show More Authors

Experiments have been conducted to study the local and average heat transfer by mixed
convection for hydrodynamically fully developed, thermally developing and fully developed
laminar upward air flow in an inclined annulus with adiabatic inner cast iron tube and uniform
heated outer aluminum tube with an aspect ratio ( Ω = 0.72) and (L/Dh≈40) for both calming and
test sections). A wide range of Reynolds number from 859 to 2024 has been covered, and heat
flux has been varied from 159 W/m2 to 812 W/m2 (these values of heat flux and Reynolds
number gave Richardson number range from 0.03 to 0.٣٨), with angles of annulus inclination
φ =0o (horizontal position), φ =60o (inclined position), and φ =90o (vertical posi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
The structure of design and technology in the contemporary design in the interior spaces
...Show More Authors

The design of the interior spaces process the product of intellectual civilization expresses the prevailing thought, discoverers of principles and beliefs through the sheen reflects the present, and generating languages ​​graphical variety caused a different revolution in design mounting structure, and because of the complex nature of the interior spaces were and we have to be a reflection of cultural reality of being a form of cultural expression and true embodiment of scientific developments prevailing for each stage where she was born, the changes occurring in human thought and then extremism and the discrepancy tastes among individuals all communities factors have caused a change in the design structure involving modernization an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 12 2017
Journal Name
Journal Of Agricultural And Food Chemistry
Using Standing Gold Nanorod Arrays as Surface-Enhanced Raman Spectroscopy (SERS) Substrates for Detection of Carbaryl Residues in Fruit Juice and Milk
...Show More Authors

View Publication
Scopus (116)
Crossref (106)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Particle-Hole State Density Calculations with Non-Equidistant Spacing Model: II. Pairing and Exact Treatment
...Show More Authors

In an earlier paper, the basic analytical formula for particle-hole nuclear state densities was derived for non-Equidistant Spacing Model (non-ESM) approach. In this paper, an extension of the former equation was made to include pairing. Also a suggestion was made to derive the exact formula for the particle-hole state densities that depends exactly on Fermi energy and nuclear binding energies. The results indicated that the effects of pairing reduce the state density values, with similar dependence in the ESM system but with less strength. The results of the suggested exact formula indicated some modification from earlier non-ESM approximate treatment, on the cost of more calculation time

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
In Situ Hybridization for Molecular Detection of Human Papilloma Viral 6 / 11 DNA in Adenoctomized Tissues from A group of Iraqi Pediatric Patients
...Show More Authors

Among more than 200 different human papilloma viral genotypes, the association of low oncogenic risk-HPV genotypes have been recognized with a variety of oral, oropharyngeal, nasopharyngeal benign tumors as well as non-neoplastic polyposis and papillomas and adenoid hypertrophy. This prospective case- control study aims to determine the rate of DNA detection of HPV genotype 6/11 in nasopharyngeal adeno- tonsillar tissues from a group of patients subjected to adenoctomy for adenoid hypertrophy . A total number of nasopharyngeal adeno-tonsillar tissue specimens from pediatric patients with adenoid hypertrophy were enrolled; 40 nasopharyngeal adeno-tonsillar tissues from patients with adenoid hypertrophy, and 20 normal nasal tissue specimen

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Hole Cleaning and Cuttings Removal in High Inclined Till Horizontal Well
...Show More Authors

The goal of this experimental study is to determine the effects of different parameters (Flow rate, cuttings density, cuttings size, and hole inclination degree) on hole cleaning efficiency. Freshwater was used as a drilling fluid in this experiment. The experiments were conducted by using flow loop consist of approximately 14 m (46 ft) long with transparent glass test section of 3m (9.84 ft.) long with 4 inches (101.6 mm) ID, the inner metal drill pipe with 2 inches (50.8 mm) OD settled with eccentric position positive 0.5. The results obtained from this study show that the hole cleanings efficiency become better with high flow rate (21 m3/hr) and it increase as the hole inclination angles increased from 60 to 90 degree due to dominated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Journal Of The College Of Languages (jcl)
Modal Component in Meaningful Structure of the Utterance with the Semantics of “Disappearance” in Russian
...Show More Authors

Abstract

The article is devoted to the study of modal framework of the utterance with the semantics of “disappearance” in modern Russian language. The empirical basis of the study was the works of Russian writers, such as M.A. Bulgakov, F.M. Dostoevsky, A.I. Kuprin., L.M. Leonov, B.L. Pasternak, K.G. Paustovsky, L.N. Tolstoy, I.S. Turgenev and others. The author focuses special attention on the role of the modal component in the formation of the sentences and its modal semantics. A lot attention is paid to the analysis of the reasons of productivity / low productivity in the functioning of the temporal forms of the verbs that form these utterances. The nature of the material of study determined the choice of

... Show More
View Publication Preview PDF
Crossref