The rapid evolution of artificial intelligence (AI) in the Fourth Industrial Revolution (IR 4.0) has increased the demand for AI talents globally, yet there remains a shortage, including in Malaysia. It has brought at...
详细信息
Autism Spectrum Disorder (ASD) is a complex neurodevelopmental condition that impacts social communication, behavior, and cognitive functions. Early detection of autism is crucial for timely intervention, which can si...
详细信息
'ML-AgriCare: Enhancing Crop Yield through Machine Learning-based Crop Predictor, Fertilizer Recommender, and Plant Disease Predictor' introduces an integrated ML system revolutionizing agricultural practices....
详细信息
Brain tumor segmentation from MRI scans is a critical process in medical diagnostics, influencing both the prognosis and the strategy of treatment for patients. Traditional methods of segmentation by radiologists are ...
详细信息
This paper proposes a skyrmion based 1-bit comparator implemented using a 1 × 4 demultiplexer (DMUX) and an OR-gate. A stack is composed of heavy metal (HM) and ultrathin ferromagnetic (FM) i.e., platinum (Pt) an...
详细信息
In the pursuit of developing more effective vaccines against viruses like SARS-CoV-2, understanding their potential mutations is crucial. In order to generate protein sequences, this study presents a unique framework ...
详细信息
ISBN:
(纸本)9798350365269
In the pursuit of developing more effective vaccines against viruses like SARS-CoV-2, understanding their potential mutations is crucial. In order to generate protein sequences, this study presents a unique framework that synergistically blends phylogenetic data with Generative Adversarial Networks (GANs). The proposed method combines the strengths of two models: TEMPO, a transformer-based model proficient in leveraging phylogenetic data for mutation detection in SARS-CoV-2, and MutaGAN, a GAN-based model adept in generating synthetic protein sequences. The phylogenetic data from TEMPO is used in this novel design as the input for the MutaGAN generator, replacing the conventional random noise input used in GANs. The generator may now create synthetic protein sequences that are impacted by the evolutionary past included in the phylogenetic data resulting in the creation of artificial protein sequences that are more biologically significant and lifelike. The discriminator portion of the model, similar to MutaGAN, is still in charge of determining whether or not the input sequences comprise a valid parent-child pair and uses sequences produced by the first GAN as extra negative cases. This prevented the model from going too far off its planned route. Additional investigation into this fascinating confluence of bioinformatics and AI may be possible as a result of this study's conclusions. This approach has tremendous promise in many applications, such as the production of more powerful vaccinations, protein engineering, medication design, and improving our knowledge of biological systems, by forecasting how SARS-CoV-2 could change. A precision of 0.662 and an accuracy of around 0.671, together with a Matthews Correlation Coefficient (MCC) score of 0.313, show that the framework performs very well. These scores show that the framework performs better than a number of cutting-edge baseline techniques. The synthetic protein sequences generated by the framework not only bea
This paper aims to develop a novel robust multi-dialect end-to-end ASR system with beam search threshold pruning. The efficacy of our proposed model is evaluated using word error rate (WER). Our key contributions are:...
详细信息
A Deep Q-Learning approach to Intrusion Detection and Prevention Systems (IDPS) offers a cutting-edge solution for enhancing cybersecurity by leveraging intelligent machine learning models. This method dynamically ada...
详细信息
The Border Gateway Protocol (BGP) is responsible for updating inter-domain routing information. One of the poorly understood aspects of BGP behaviour that has a direct impact on Internet stability is route flapping, w...
详细信息
Electricity fraud is causing huge losses in both the public and private sectors. The proposition of this paper uses a temporarily controlled learning program to include potential theft data from non-specific data on t...
详细信息
暂无评论