Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological process, and cellular component is used to get the functional domain. The reliability of the proposed algorithm is examined against the algorithms proposed in the literature. To this end, a yeast protein-protein interaction dataset is used in the assessment of the final quality of the algorithms. To make fake negative controls of PPIs that are wrongly informed and are linked to the high-throughput interaction data, different noisy PPINs are created. The noisy PPINs are synthesized with a different and increasing percentage of misinformed PPIs. The results confirm the effectiveness of the extended evolutionary algorithm design to utilize the biological knowledge of the gene ontology. Feeding EA design with GO annotation data improves reliability and produces more accurate detection results than the counterpart algorithms.
Breast cancer is the commonest cancer affecting women worldwide. Different studies have dealt with the etiological factors of that cancer aiming to find a way for early diagnosis and satisfactory therapy. The present study clarified the relationship between genetic polymorphisms of BRCA1 & BRCA2 genes and some etiological risk factors among breast cancer patients in Iraq. This investigation was carried out on 25 patients (all were females) who were diagnosed as breast cancer patients attended AL-Kadhemya Teaching Hospital in Baghdad and 10 apparently healthy women were used as a control, all women (patients and control) aged above 40 years. The Wizard Promega kit was used for DNA isolation from breast patients and normal individuals. B
... Show MoreAtorvastatin calcium (ATR) is an antihyperlipidemic agent used for lowering blood cholesterol levels. However, it is very slightly soluble in water with poor oral bioavailability, which interferes with its therapeutic action. It is classified as a class II drug according to Biopharmaceutical Classification System (low solubility and high permeability).
This paper is summarized with one of the applications of adsorption behavior; A UV-Vis method has been applied to survey the isotherm of adsorption. Results for experimental showed the applicability of Langmuir equation. The effect of temperature on the adsorption of cobalt (II) Complex by bentonite surface was studied. The results shown that the amount of adsorption was formed to increase, such as the temperature increase (Endothermic process). Cobalt (II) Complex has adsorption studies by bentonite surface at different pH values (1.6-10); these studies displayed an increase in adsorption with increasing pH. ∆G, ∆H, and ∆S thermodynamic functions of the cobalt (II) Complex for their adsorption have been calculated
The follower of the needs of the users of accounting information notices the necessity of adopting faithful representation of information Hence, IASB adopted the economic substance approach as the basis for the Formulation and development of international accounting standards Therefore, this research discusses the reflection of the economic phenomenon in terms of its economic substance on the subject of measurement , And it should be consistent measurement method where the problem of research is concentrated in the fact that the economic units operating in the local environment to address events and economic phenomena according to the legal form , as appropriate With the requirements of the unified accounting sys
... Show MoreAbstract
The research problem focuses on studying the interest of the Medical City Department of the Ministry of Health in improving the creative thinking skills of the administrative leadership through parallel & comprehensive thinking according to the of six thinking hats strategy. The research sample consisted of (170) administrative leaders in the upper & middle organizational levels, The questionnaire was used as a main tool for data collection, In addition to the observation & Interview, The research sought to answer the following questions: What is the extent to which the administrative leadership (Tpp & middle) in the organization investigated the concept of the six thinkin
... Show MoreThe Electric Discharge (EDM) method is a novel thermoelectric manufacturing technique in which materials are removed by a controlled spark erosion process between two electrodes immersed in a dielectric medium. Because of the difficulties of EDM, determining the optimum cutting parameters to improve cutting performance is extremely tough. As a result, optimizing operating parameters is a critical processing step, particularly for non-traditional machining process like EDM. Adequate selection of processing parameters for the EDM process does not provide ideal conditions, due to the unpredictable processing time required for a given function. Models of Multiple Regression and Genetic Algorithm are considered as effective methods for determ
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe current research aims to focus on strategic vigilance dimensions and contained (environmental vigilance, technological vigilance, competitive vigilance, vigilance marketing) to improve nursing services, which include a) the quality, timeliness, problem-solving and decision-making, relationships with others, leadership skills) and measure the degree link and influence between strategic vigilance in the hospital respondent and improve nursing service that the problem of the research lies in the weakness of strategic plans and health organizations in general and the hospital surveyed (martyr Ghazi al-Hariri), in particular, the lack of awareness of the hospital researched strategy vigilant management to improve nursing services,
... Show MoreFusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentrati
... Show More