The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, which is used to cluster genes. FCM allows an object to belong to two or more clusters with a membership grade between zero and one and the sum of belonging to all clusters of each gene is equal to one. This paradigm is useful when dealing with microarray data. The total time required to implement the first model is 22.2589 s. The second model combines FCM and particle swarm optimization (PSO) to obtain better results. The hybrid algorithm, i.e., FCM–PSO, uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–PSO method is effective. The total time of implementation of this model is 89.6087 s. The third model combines FCM with a genetic algorithm (GA) to obtain better results. This hybrid algorithm also uses the DB index as objective function. The experimental results show that the proposed hybrid FCM–GA method is effective. Its total time of implementation is 50.8021 s. In addition, this study uses cluster validity indexes to determine the best partitioning for the underlying data. Internal validity indexes include the Jaccard, Davies Bouldin, Dunn, Xie–Beni, and silhouette. Meanwhile, external validity indexes include Minkowski, adjusted Rand, and percentage of correctly categorized pairings. Experiments conducted on brain tumor gene expression data demonstrate that the techniques used in this study outperform traditional models in terms of stability and biological significance.
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreBackground: Colorectal Cancer (CRC) is one of the most serious health problems and Herpes viridae may hasten the progression of colon cancer. Aim: The purpose of conducting this research is to investigate the existence of Herpes Simplex Virus (HSV1) infection in samples of Colorectal Cancer (CRC) compared with normal tissue. Material and Methods: 40 samples of tissues (30 patients ) with CRC, and (10 samples) of normal tissue (without cancer) were obtained, for immunohistochemically analysis of Herpes Simplex Virus (HSV1) expression Results: The results showed no significant data to justify the link between both Herpes Simplex Virus (HSV1) and human colorectal cancer. Despite of presence of Herpes Simplex Virus (HSV1) found in
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreObjective: The present work was undertaken to investigate the impact of sub inhibitory concentration of gentamicin on hla gene expression in methicillin resistant Staphylococcus aureus isolates. Methods: The bacterial isolates used in this study represent 33 MRSA strains, previously isolated form patients visiting several hospitals in Baghdad. Gentamicin, vancomycin, and oxacillin MIC were determined using broth dilution method. Microtiter plate method was adopted to investigate the biofilm forming capacity. Alpha hemolysin was detected by culturing MRSA isolates on rabbit blood agar. Furthermore, hla gene was detected in MRSA isolates using conventional PCR technique; while, qRT-PCR method was performed to assay the hla expression in plank
... Show MoreHepatitis B infection is a prominent infectious disease caused by hepatitis B virus (HBV), which infect liver and is considered as the main cause of liver cirrhosis, fibrosis and liver cancer worldwide. A pro-inflammatory cytokine Interleukin32 is believed to have a role in chronic HBV infections. Since its role in CHB infections is remain unclear, this study was done to detect IL-32 gene expression in CHB patients in order to identify its exact role. A total number of 110 blood samples were collected from Gastroenterology and Hepatology Teaching Hospital in Baghdad Medical City from CHB patients for both males and females with different age groups according to the research ethics form then sent to Central Public Health Laboratory (CPHL),
... Show MoreThis study is the first investigation in Iraq dealing with genotyping of
Introduction: Biocides are commonly used for disinfection in a variety of contexts. They are generally used to avoid infection by controlling biofilm on medical equipment. However, the literature lacks information on the effect of biocide on efflux pump gene expression. Objective: To determine the influence of biocide on biofilm development and efflux pump acrA and ramA gene expression. Methodology: The microtiter plate method was used to identify biofilm development in 80 isolates of K. pneumoniae. The minimal inhibitory concentrations (MIC) of three biocides (quaternary ammonium compound (QAC), chlorohexidine digluconate, and chloroxylenol) were estimated. The effect of QAC on the intensity and viability of biofilms was investigated as we
... Show More