The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, which is used to cluster genes. FCM allows an object to belong to two or more clusters with a membership grade between zero and one and the sum of belonging to all clusters of each gene is equal to one. This paradigm is useful when dealing with microarray data. The total time required to implement the first model is 22.2589 s. The second model combines FCM and particle swarm optimization (PSO) to obtain better results. The hybrid algorithm, i.e., FCM–PSO, uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–PSO method is effective. The total time of implementation of this model is 89.6087 s. The third model combines FCM with a genetic algorithm (GA) to obtain better results. This hybrid algorithm also uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–GA method is effective. Its total time of implementation is 50.8021 s. In addition, this study uses cluster validity indexes to determine the best partitioning for the underlying data. Internal validity indexes include the Jaccard, Davies Bouldin, Dunn, Xie–Beni, and silhouette. Meanwhile, external validity indexes include Minkowski, adjusted Rand, and percentage of correctly categorized pairings. Experiments conducted on brain tumor gene expression data demonstrate that the techniques used in this study outperform traditional models in terms of stability and biological significance.
This study includes the application of non-parametric methods in estimating the conditional survival function of the Beran method using both the Nadaraya-Waston and the Priestley-chao weights and using data for Interval censored and Right censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy Considering age is continuous variable, through using (MATLAB) use of the (MSE) To compare weights The results showed a superior weight (Nadaraya-Waston) in estimating the survival function and condition of Both for chemotherapy and radiation therapy.
The effect of Low-Level Laser (LLL) provided by green semiconductor laser with an emission wavelength of 532 nm on of human blood of people with brain and prostate cancer has been investigated. The effect of LLL on white blood cell (WBC), NEUT, LYMPH and MONO have been considered. Platelet count (PLT) has also been considered in this work. 2 ml of blood sample were irradiating by a green laser of the dose of 4.8 J/cm2. The results suggest a potential effect of LLL on WBC, PLT, NEUT, LYMPH, and MONO of people with brain and prostate cancer Key words: white blood cell , platelet , low-level laser therapy
Breast carcinoma is one of the greatest popular neoplasms in females. It is a major reason of demise in the world, and it is the first cancer in ranking diagnosed in Iraqi women. This study aimed to determine aminoacyltRAN-synthetase complex interacting multifunctional protein 1 and liver enzymes levels in Iraqi females with stage II breast malignance, and study the effect of chemotherapy (after surgery) on these markers. This study included 50 females patients with stage II breast malignance (before and after surgery and second dose of chemotherapy) attending the Oncology Teaching Hospital in Medical City/ Baghdad, in addition to 20 persons as controller group were chosen without any chronic diseases. Their ages ranged from (30-55) years.
... Show Moreفي هذا البحث تم تحضير المركبات المعدنية الجديدة لأيونات البلاتين (الرباعي) و الذهب (الثلاثي) مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين . تم استخدام المعقدات بعد ذلك كمصدر لتحضير جزيئات عن طريق ترسيب المعقدات على مسام دقائق السيليكا النانوية. Si/Au2O3 Si/PtO2 تم تشخيص الليكاند و معقداته
... Show MoreMutations in genes encoding proteins necessary for detoxifying oxidative stress products have been predicted to increase susceptibility to lung cancer (LC). Despite this, the association between waterpipe tobacco smoking (WP), genetic polymorphisms, and LC risk remains poorly understood. This is the first study to explore the relationship between WP tobacco smoking and these genetic factors. Previously, we investigated the association of GSTP1 SNPs (rs1695-A/G and rs1138272-C/T) with LC in Iraqi males who smoke WP. Here, we expanded our analysis to include GSTM1 (active/null) and GSTT1 (active/null) genotypes, both individually and in combination with GSTP1 SNPs. Multiplex PCR and RFLP-PCR assays were utilized to determine the genotypes of
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More