Preferred Language
Articles
/
EhiOcpUBVTCNdQwCHC6V
U-Net for genomic sequencing: A novel approach to DNA sequence classification
...Show More Authors

The precise classification of DNA sequences is pivotal in genomics, holding significant implications for personalized medicine. The stakes are particularly high when classifying key genetic markers such as BRAC, related to breast cancer susceptibility; BRAF, associated with various malignancies; and KRAS, a recognized oncogene. Conventional machine learning techniques often necessitate intricate feature engineering and may not capture the full spectrum of sequence dependencies. To ameliorate these limitations, this study employs an adapted UNet architecture, originally designed for biomedical image segmentation, to classify DNA sequences.The attention mechanism was also tested LONG WITH u-Net architecture to precisely classify DNA sequences into BRAC, BRAF, and KRAS categories. Our comprehensive methodology includes rigorous data preprocessing, model training, and a multi-faceted evaluation approach. The adapted U-Net model exhibited exceptional performance, achieving an overall accuracy of 0.96. The model also achieved high precision and recall rates across the classes, with precision ranging from 0.93 to 1.00 and recall between 0.95 and 0.97 for the key markers BRAC, BRAF, and KRAS. The F1-score for these critical markers ranged from 0.95 to 0.98. These empirical results substantiate the architecture’s capability to capture local and global features in DNA sequences, affirming its applicability for critical, sequence-based bioinformatics challenges

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
The Messenger’s approach to preaching (the Meccan stage in light of the Qur’an and Sunnah)
...Show More Authors

First: People’s need for advocacy:

Calling for a legal necessity for all people, regardless of their races, colours, tongues, and culture, to explain the truth, spread fear, bring benefits, ward off evil, regulate a person’s relationship with his Lord, and his relationship with creatures, so that he knows his money and what he owes.

All of creation is in dire need of the call to God’s religion with insight due to their inability to reach out to goodness, righteousness, guidance, and success on their own. Man is limited in thinking in this universe, limited in his resolve, unable to know what will improve his affairs in the two worlds. His need for religion is one of the necessities of his life, and one of the comple

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Wed Nov 01 2023
Journal Name
Solar Energy
Optimizing performance of water-cooled photovoltaic-thermal modules: A 3D numerical approach
...Show More Authors

To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult

... Show More
View Publication
Scopus (21)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 13 2020
Journal Name
International Journal Of Environmental Research
Synthesis of a Novel Composite Sorbent Coated with Siderite Nanoparticles and its Application for Remediation of Water Contaminated with Congo Red Dye
...Show More Authors
Abstract

Re-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c

... Show More
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Natural Science Research
Sialic Acid Is A Novel Biochemical Marker In Sera Of Iraqi Endometriotic Patients
...Show More Authors

ABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Jpras Open
The utility of a novel vacuum-assisted foreign body extraction technique from wounds
...Show More Authors

Retained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.

... Show More
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref