Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological process, and cellular component is used to get the functional domain. The reliability of the proposed algorithm is examined against the algorithms proposed in the literature. To this end, a yeast protein-protein interaction dataset is used in the assessment of the final quality of the algorithms. To make fake negative controls of PPIs that are wrongly informed and are linked to the high-throughput interaction data, different noisy PPINs are created. The noisy PPINs are synthesized with a different and increasing percentage of misinformed PPIs. The results confirm the effectiveness of the extended evolutionary algorithm design to utilize the biological knowledge of the gene ontology. Feeding EA design with GO annotation data improves reliability and produces more accurate detection results than the counterpart algorithms.
Klebsilla pneumoniae is one of must opportunistic pathogens that causes nosocomial infection, UTI, respiratory tract infections and blood infections. ZrO2 nanoparticles have antimicrobial activity against some pathogenic bacteria and fungi. Ceftazidime is one of third generation cephalosporins groups of antibiotecs, characterized by its broad spectrum on bacteria in general and particularly on Enterobacteriaceae family like Klebsiella spp. Method: Diverse clinical samples of Klebsilla pneumoniae were isolated from several hospitals in Baghdad – Iraq and ZrO2 nanoparticles was investigated against it. Ceftazidime was also investigated against K. pneumoniae. Both of ZrO2 nanoparticles and ceftazidime were mixed together and investigated aga
... Show MoreThe Tigris River, a vital water resource for Iraq, faces significant challenges due to urbanization, agricultural runoff, industrial discharges, and climate change, leading to deteriorating water quality. Traditional methods for assessing irrigation water quality, such as laboratory testing and statistical modeling, are often insufficient for capturing dynamic and nonlinear relationships between parameters. This study proposes a novel application of the Gravitational Search Algorithm (GSA) to estimate the Irrigation Water Quality Index (IWQI) along the Tigris River. Using data from multiple stations, the study evaluates spatial variability in water quality, focusing on key paramete
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreMost heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par
... Show MoreObjective: Matrix tablet approach is one of the delivery systems intended for poorly water-soluble drugs, like candesartan cilexetil (CC). CC is a class II drug used for the treatment of hypertension. Methods: Matrix tablets from (F1x to F18z) were prepared in the presence of β‑cyclodextrin. Matrix tablet formulation ensures control release of the drug and higher dissolution by β‑cyclodextrin. Fourier transform infrared spectroscopy (FTIR), and differential scanning calorimetry (DSC) were used to study compatibility. Results: The angle of repose determination showed good flow for most of the formulas, besides having good compressibility. Weight variation test for all formulas showed accepted value. Drug content measurement sho
... Show MoreObjective: Matrix tablet approach is one of the delivery systems intended for poorly water-soluble drugs, like candesartan cilexetil (CC). CC is a class II drug used for the treatment of hypertension. Methods: Matrix tablets from (F1x to F18z) were prepared in the presence of β‑cyclodextrin. Matrix tablet formulation ensures control release of the drug and higher dissolution by β‑cyclodextrin. Fourier transform infrared spectroscopy (FTIR), and differential scanning calorimetry (DSC) were used to study compatibility. Results: The angle of repose determination showed good flow for most of the formulas, besides having good compressibility. Weight variation test for all formulas showed accepted value. Drug content measurement sho
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreIt is an established fact that substantial amounts of oil usually remain in a reservoir after primary and secondary processes. Therefore; there is an ongoing effort to sweep that remaining oil. Field optimization includes many techniques. Horizontal wells are one of the most motivating factors for field optimization. The selection of new horizontal wells must be accompanied with the right selection of the well locations. However, modeling horizontal well locations by a trial and error method is a time consuming method. Therefore; a method of Artificial Neural Network (ANN) has been employed which helps to predict the optimum performance via proposed new wells locations by incorporatin