With the advent of 5G and 6G endpoints, the deployment of billions of IoT devices is anticipated to increase significantly. On the other hand, this expansion will result in the generation of enormous volumes of data t...
详细信息
Background: understanding the genetic basis of cancer is essential for effective diagnosis, prognosis, and treatment. With an extensive array of gene expression data, pinpointing relevant genes is a significant challe...
详细信息
ISBN:
(纸本)9789819736034
Background: understanding the genetic basis of cancer is essential for effective diagnosis, prognosis, and treatment. With an extensive array of gene expression data, pinpointing relevant genes is a significant challenge. This study employs a combination of Machine Learning (ML) and bio-inspired algorithms to isolate important genes within a Breast Cancer gene expression dataset. Methods: The research utilized a Breast Cancer dataset encompassing 24,481 Affymetrix probe IDs from 97 samples. The initial step involved using the Fisher scores method to select the top 1000 probe IDs. This list was further refined to the top 100 probe IDs using five bio-inspired algorithms: Salp Swarm Algorithm (SSA), Grey Wolf Optimizer (GWO), Artificial Bee Colony (ABC), Ant Colony Optimization (ACO), and Multi Objective Spotted Hyena Optimizer (MOSHO). These probe IDs were then evaluated using five classifiers: k-Nearest Neighbors (kNN), Support Vector Machine (SVM), Random Forest (RF), Naive Bayes (NB), and Nearest Centroid (NC). The final stage involved using BLAST for aligning the probe IDs and determining their corresponding gene names. Results: The study integrated results from all bio-inspired techniques and classifiers to identify frequently recurring genes. A new Breast Cancer dataset was created by merging gene selections from each algorithm. The genes were then analyzed based on their frequency of appearance across the optimizers, categorized into groups of 4, 3, and 2 occurrences. For genes consistently appearing across all algorithms and classifiers (with 2 occurrences), Recursive Feature Elimination (RFE) was applied. This process led to the successful pairing of 107 high-quality probe IDs using BLAST, with 62 of these IDs aligned to specific gene names. Conclusion: This in-depth and multi-layered approach identified 107 genes as potential key contributors to cancer progression. Notably, 17 of these genes have a direct link to cancer, while two may have potential associat
The rapid growth in the use of IoT devices has highlighted significant challenges due to their limited computational power and battery life, often resulting in long task execution times and potential battery depletion...
详细信息
Early and accurate breast cancer detection is crucial for effective intervention and improved patient outcomes. Conventional methods often encounter challenges in achieving the required accuracy. To address this, we a...
详细信息
The unchecked spread of deepfake videos jeopardizes public trust, national security, and media credibility. The capacity to recognize falsified videos is critical for protecting privacy and combatting misinformation. ...
详细信息
The malfunctioning of cardiac autonomic control in epileptic patients develops ventricular tachyarrhythmia and causes sudden unexpected death in epilepsy patients (SUDEP). Various clinical studies investigated the eff...
详细信息
The malfunctioning of cardiac autonomic control in epileptic patients develops ventricular tachyarrhythmia and causes sudden unexpected death in epilepsy patients (SUDEP). Various clinical studies investigated the effect of epilepsy on cardiac autonomic control by performing heart rate variability (HRV) analysis;however, results are unclear regarding whether sympathetic, parasympathetic, or both branches of the autonomic nervous system (ANS) are affected in epilepsy and also the impact of anticonvulsant treatment on the ANS. This study follows the systematic protocols to investigate epilepsy and its anticonvulsant treatment on cardiac autonomic control by using linear and nonlinear HRV analysis measures. The electronic databases of PubMed, Embase, and Cochrane Library were used for the collection of studies. Initially, 1475 articles were identified whereas after 2-staged exclusion criteria, 33 studies were selected for execution of the review process and meta-analysis. For meta-analysis, four comparisons were performed (epilepsy patients): (1) controls (healthy subject with no history of epilepsy) versus untreated patients;(2) treated (patients under treatment that have a seizure) versus untreated patients;(3) controls versus treated patients;and (4) refractory versus well-controlled (epilepsy patients that were seizure-free for last 1 year). For treated and untreated patients, there was no significant difference whereas well-controlled patients presented higher values as compared to refractory patients. Meta-analysis was performed for the time-domain, frequency-domain, and nonlinear parameters. Untreated patients in comparison with controls presented significantly lower HF (high-frequency) and LF (low-frequency) values. These LF (g = − 0.9;95% CI − 1.48 to − 0.37) and HF (g = − 0.69;95% confidence interval (CI) − 1.24 to − 0.16) values were affirming suppressed both, vagal and sympathetic activity, respectively. Additionally, LF and HF value was increased in most o
Despite the fact that audio authentication has been around for some time, usage has lately increased as a result of advancements in speech recognition technology and rising security concerns. They have reached their h...
详细信息
ISBN:
(纸本)9783031689079
Despite the fact that audio authentication has been around for some time, usage has lately increased as a result of advancements in speech recognition technology and rising security concerns. They have reached their height in recent years as a result of their versatility, increased security, and simplicity of use. They offer a quick and secure way to authenticate users and protect sensitive information, and as speech recognition technology advances, their use will undoubtedly grow. Since it is simple to remember and use, image authentication has grown in popularity recently. However, studies show that it may be susceptible to guessing-based attacks, especially if the image is instantly recognizable or publicly accessible, and it may not be suitable for all users, particularly those who have trouble using touch screens. Image authentication has lately been substituted by audio validation since it may be more accessible to people with visual impairments. The audio point positioning algorithm is used in this audio authentication to incorporate the sound positions from the audio that has been provided for validation. The search issue is overcome in this work by conducting the user’s search through analysis of the search engine logs that contain click through data. A framework model search engine based on user desire with this helps to ease this using click-through data from feedback sessions, users’ preferences can be mined. Recently, audio validation has taken the role of image authentication since it may be more accessible to persons who are blind and is also more secure. Using the audio point positioning algorithm and the least significant bit coding approach, sound positions in the audio that is provided for validation are incorporated into this audio authentication. Because it incorporates unique security issues and permissions, this type of authentication is typically difficult to guess and access. The audio that has been verified at particular points is played an
Autism is a complex neuro - developmental condition characterized by challenges in social interaction and communication. Early diagnosis and intervention are crucial for effective support. This paper presents a novel ...
详细信息
The importance of learners enhancing their self-regulation skills during the learning process has been emphasized by numerous studies. The provision of online feedback prompts learners to direct and monitor their own ...
详细信息
The primary goal of the human hand tracking system in this suggested system is to establish communication between the robotic module and the human hand. Human-computer interaction establishes a connection between peop...
详细信息
暂无评论