The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, which is used to cluster genes. FCM allows an object to belong to two or more clusters with a membership grade between zero and one and the sum of belonging to all clusters of each gene is equal to one. This paradigm is useful when dealing with microarray data. The total time required to implement the first model is 22.2589 s. The second model combines FCM and particle swarm optimization (PSO) to obtain better results. The hybrid algorithm, i.e., FCM–PSO, uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–PSO method is effective. The total time of implementation of this model is 89.6087 s. The third model combines FCM with a genetic algorithm (GA) to obtain better results. This hybrid algorithm also uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–GA method is effective. Its total time of implementation is 50.8021 s. In addition, this study uses cluster validity indexes to determine the best partitioning for the underlying data. Internal validity indexes include the Jaccard, Davies Bouldin, Dunn, Xie–Beni, and silhouette. Meanwhile, external validity indexes include Minkowski, adjusted Rand, and percentage of correctly categorized pairings. Experiments conducted on brain tumor gene expression data demonstrate that the techniques used in this study outperform traditional models in terms of stability and biological significance.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreNatural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MorePrevious studies in Euro-American countries have shown that patients with chronic hepatitis C virus infection have increased levels of neuropsychiatric symptoms. While chronic hepatitis C virus infection has been reported in Arab countries such as Iraq, there is little studies about the neuropsychological burden associated with chronic hepatitis C among patients in the Arab region. The aim of the current study was to measure the prevalence and level of severity of depression, anxiety and stress among a sample of chronic hepatitis C patients in AL-Najaf province /Iraq. The current study was cross-sectional study carried out on (110) already diagnosed chronic viral hepatitis C patients who attended the Gastroenterology and Hepatology
... Show MoreHypertension is identified as one of the most significant risk factors for cardiovascular diseases (CVDs). There is growing evidence showing that oxidative stress plays a major role in hypertension. Increased production of reactive oxygen species and decrease bioavailability of antioxidant have been demonstrated in experimental and human hypertension. The present study was directed to determine the beneficial effect of the antioxidant vitamin C in patients with essential hypertension treated with the calcium channel blocker (amlodipine) or with the angiotensin converting enzyme inhibitor (enalapril). Ninety six patients (50 females and 46 males) with essential hyp
... Show MoreThe study introduces the twentieth century background where the image of teacher is shaped by various factors according to the wide emergence of new educational institutions in the aftermath of the Second World War. A group of writers mirrored the influence of the war on educational institutions and accordingly on the image of teacher in their novels whose main action is set in and around the campus of a university. The genre dates back to the nineteen forties. where they show the foibles of human nature and reactions to external pressures. One of the early examples of this genre is Lucky Jim (1954). The image of teacher is swinged in many shapes from the tyrant to the rebellion to the defiant. All is personified in the characters of these
... Show More