the present study aimed to investigate the association of endothelial nitric oxide synthase gene polymorphism with susceptipility and severity of coronary artery diseases(CAD) in Egyptian cases. the study included 100...
详细信息
the present study aimed to investigate the association of endothelial nitric oxide synthase gene polymorphism with susceptipility and severity of coronary artery diseases(CAD) in Egyptian cases. the study included 100 cases from intensive care units(ICU) of Cardiology Department of Internal Medicine, University Hospital, as well as Ministry of Health Hospitals of Dakahlia(Mansoura University Hospital) & Gharbia(Elmehalla Heart Center) governorates,divided into 50 patients with coronary artery diseases and 50 healthy as *** mean age of cases was 57.28±11.51, including 40 males and 10 *** samples were collected in tubes for biochemical analysis(5 ml) from each case {Hb concentration, ***, AST, ALT, creatinine, cholesterol, TG, LDL, HDL, LDH}. DNA was amplified using PCR-SSP for detection of relation between polymorphism and endothelial nitric oxide synthase gene in three parts G894 T, T786 C and 27 bP. All cases showed significant differences between cases and controls regarding their chemical lab's analysis {Hb concentration,W.B.C.s, AST, ALT, creatinine, cholesterol, TG, LDL, HDL, LDH}.All cases showed significant frequency of G894 T GG(p> 0.05,OR =0.49) and G894 T TT(p=0.001,OR =0.37). Also there were significant frequency of T786 C TT(p>0.05, OR=0.57).C786 T CC(P=0.004,0 R=4.58),and there were no significant frequency of 27 bp aa(p=0.032,OR=2.891),27 bp bb(p>0.05, OR =1.86). these were considered risk genotypes for diseases susceptibility. On the other hand all cases showed no significant frequency with combined heterozygosity for G894 T GT(P>0.05, OR=0.67) or C786 T CT(P>0.05,OR =0.72) or 27 bp ab(p=0.001, OR=0.25). So, endothelial nitric oxide synthase gene polymorphism in G894 T andT786 C can be considered genetic markers for coronary artery diseases among Egyptian cases.
Recently, suggestion frameworks have seen important development in the field of information designing. A large portion of the current proposal frameworks construct their models in light of collaborative filtering appr...
详细信息
Recently, suggestion frameworks have seen important development in the field of information designing. A large portion of the current proposal frameworks construct their models in light of collaborative filtering approaches that make them easy to actualize. Even though, there are many filtering techniques but execution of the existing filtering based proposal framework suffers from difficulties such as cold start, data sparseness, and availability. Proposal issue is regularly characterized by the nearness of numerous incompatible goals or choice variables, for example, clients' preference and venue closeness. Mobi-Context is a hybrid cloud-based Bi-Objective Recommendation Framework is proposed for versatile informal organizations. the Mobi-Context uses multi-target optimization techniques to produce customized proposals. To give solution for the issues relating to cold start and data sparseness condition, the BORF performs information preprocessing by utilizing the Hub-Average (HA) inference model and Weighted Sum Approach (WSA) is actualized for scalar optimization and NSGA-II is connected for vector optimization to give ideal recommendations to the clients around a venue.
Social media is currently a place where massive data is generated continuously. Nowadays, majority of the people share their opinions online. Hence, microblogging websites are rich sources of information which have be...
详细信息
Social media is currently a place where massive data is generated continuously. Nowadays, majority of the people share their opinions online. Hence, microblogging websites are rich sources of information which have been successfully leveraged for the analysis of sociopragmatic phenomena such as belief, opinion and sentiment in online communication. However, the unprecedented existence of such massive data acts as a double edged sword, one can easily get unreliable information from such sources,and it is a challenge to control the spread of false information either maliciously or even inadvertently. the information seeker is inundated with an influx of data. To cope withthis , here we introduce a new method for automatically determining the opinion and to assess the credibility of the information. To identify an opinion (positive or negative) about a review, sentiment analysis is performed using Bing Liu's dictionary and to improve the accuracy of sentiment classification incrementers, decrementers and negation modifiers are considered. For assessing credibility a new method , "Automatic Helpfulness Classification", is introduced. the effects are proven by experiments using a large number of reviews and the accuracy obtained is more compared to existing methods.
Privacy preserving data publishing(PPDF)is an emerging technology in the datamining field which performs datamining operations in a secured manner to preserve the confidential/sensitive information. Preserving privacy...
详细信息
Privacy preserving data publishing(PPDF)is an emerging technology in the datamining field which performs datamining operations in a secured manner to preserve the confidential/sensitive information. Preserving privacy while publishing medical information has become an important challenge in this area due to its high confidentiality. While publishing medical data the PPDF scheme should maximize the data utility at the same time should have a minimum data disclosure risk. this paper concerned with privacy of medical data while publishing the patient information for research or analysis purposes. K-anonymity and l-diversity are the most popular techniques used for preserving privacy. these techniques does not consider the semantic relationship between the data values so they are prone to similarity attack .In this paper, we present a privacy-preserving data publishing framework for publishing large datasets withthe goals of providing different levels of utility to the users based on their access privileges. the proposed system overcome the similarity attack by applying a privacy preservation approach which uses a key attribute masking technique and an anonymization *** results showed that the semantic anonymization increases the privacy level with effective data utility.
this proceedings consists of 20 papers which have been selected and invited from the submissions to the 4thinternationalconference on computerscience, Applied Mathematics and Applications (ICCSAMA 2016) held on 2-3...
ISBN:
(数字)9783319388847
ISBN:
(纸本)9783319388830;9783319388847
this proceedings consists of 20 papers which have been selected and invited from the submissions to the 4thinternationalconference on computerscience, Applied Mathematics and Applications (ICCSAMA 2016) held on 2-3 May, 2016 in Laxenburg, Austria. the conference is organized into 5 sessions: Advanced Optimization Methods and their Applications, Models for ICT applications, Topics on discrete mathematics, Data Analytic Methods and Applications and Feature Extractio, respectively. All chapters in the book discuss theoretical and practical issues connected with computational methods and optimization methods for knowledge engineering. the editors hope that this volume can be useful for graduate and Ph.D. students and researchers in Applied sciences, computerscience and Applied Mathematics.
this book presents the combined proceedings of the 7thinternationalconference on computerscience and its Applications (CSA-15) and the internationalconference on Ubiquitous Information Technologies and Application...
ISBN:
(纸本)9789811002809
this book presents the combined proceedings of the 7thinternationalconference on computerscience and its Applications (CSA-15) and the internationalconference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. the aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computerscience covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, andubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. these proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computerscience.
We present novel optimizations of the fusion plasmas simulation code, GTC on Tianhe-2 supercomputer. the simulation exhibits excellent weak scalability up to 3072 31S1P Xeon Phi co-processors. An unprecedented up to 5...
详细信息
throughout the last decade, the Baltic states have played an active role in regional and international language technology activities, supporting less-resourced languages in the digital age. this book presents the pro...
详细信息
ISBN:
(纸本)9781614997009;9781614997016
throughout the last decade, the Baltic states have played an active role in regional and international language technology activities, supporting less-resourced languages in the digital age. this book presents the proceedings of the 7thinternationalconference: Human Language Technologies – the Baltic Perspective (Baltic HLT 2016), held in Riga, Latvia, in October 2016. Baltic HLT 2016 provided a forum for sharing ideas and recent advances in human language processing with a special focus on less-resourced languages. Papers selected for the conference cover a wide range of topics, including a general overview of language technology progress in the Baltic states, actual research topics in written and spoken language processing, the creation of language resources and their applications, and proposals for a European language platform. the book is divided into five sections: overview; speech technologies and corpora; machine translation; written language resources; and methods and tools for language processing. the book will be a useful resource, not only for Baltic language researchers, but also for those working with other less-resourced languages in Europe and beyond.
this paper presents the energy saving technology of a photovoltaic system's control. Based on the photovoltaic system's state, the fuzzy selective neural net creates an effective control signal under random pe...
详细信息
ISBN:
(纸本)9783319410098;9783319410081
this paper presents the energy saving technology of a photovoltaic system's control. Based on the photovoltaic system's state, the fuzzy selective neural net creates an effective control signal under random perturbations. the architecture of the selective neural net was evolved using a neuro-evolutionary approach. the validity and advantages of the proposed energy saving technology of a photovoltaic system's control are demonstrated using numerical simulations. the simulation results show that the proposed technology achieves real-time control speed and competitive performance, as compared to a classical control scheme with a PID controller.
Autonomous navigation, as a fundamental problem of intelligent mobile robots' research, is the key technology of mobile robot to realize autonomous and intelligent. A method of combing computer vision and machine ...
详细信息
ISBN:
(纸本)9783319410098;9783319410081
Autonomous navigation, as a fundamental problem of intelligent mobile robots' research, is the key technology of mobile robot to realize autonomous and intelligent. A method of combing computer vision and machine learning for the problem of robot indoor navigation is proposed in the paper. It realizes robot autonomous navigation through imitating the behavior of experts. through a camera to perceive environmental information, expert provides some examples of navigation for robot to learn and robot learns a control strategy based on these samples using imitation learning algorithm. When robot is running, the control strategy learned can infer a corresponding control command based on the current perception of environmental information. therefore, robot is able to mimic the behavior of expert to navigate autonomously.
暂无评论