about.jpg

Community assessment to advance computational prediction of cancer drug combinations in a pharmacogenomic screen

Artificial Intelligence
Healthcare

INVESTIGATION OF DIFFERENTIALLY EXPRESSED GENE RELATED TO HUNTINGTON'S DISEASE USING GENETIC ALGORITHM

neurodegenerative diseases have complex pathological mechanisms. Detecting disease-associated genes with typical differentially expressed gene selection approaches are ineffective. Recent studies have shown that wrappers Evolutionary optimization methods perform well in feature selection for high dimensional data, but they are computationally costly. This paper proposes a simple method based on a genetic algorithm engaged with the Empirical Bays T-statistics test to enhance the disease-associated gene selection process. The proposed method is applied to Affymetrix microarray data from

Artificial Intelligence
Healthcare
Software and Communications

Towards mature temporal accuracy assessment of processors models and simulators for real-time systems development

Modeling and simulation are becoming extensively used in embedded and Real-Time Systems (RTSs) development throughout the development life-cycle, from the system-level design space exploration to the fine grained time analysis and evaluation of the system and even its components performance. At the core of these systems lies the processor which has been also the center of attention for most of the modeling and simulation efforts related to RTS simulation. Although the temporal accuracy of such models and simulators is of critical importance for Real-Time (RT) applications, it is not yet mature

Artificial Intelligence
Energy and Water
Software and Communications

IoT Modes of Operations with Different Security Key Management Techniques: A Survey

The internet of things (IoT) has provided a promising opportunity to build powerful systems and applications. Security is the main concern in IoT applications due to the privacy of exchanged data using limited resources of IoT devices (sensors/actuators). In this paper, we present a classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and the typical field of application. It has been found that the majority of IoT services can be classified into one of four IoT modes: Gateway, device to device, collaborative, and centralized. The

Artificial Intelligence
Circuit Theory and Applications

Control of a two link planar electrically-driven rigid robotic manipulator using fractional order SOFC

An intelligent adaptive fuzzy logic control technique, Fractional Order Self Organizing Fuzzy Controller (FOSOFC) is presented and applied to control a two link planar electrically-driven rigid robotic (EDRR) manipulator system. As EDRR is a multi-input multi-output complex nonlinear system, an intelligent adaptive controller, FOSOFC is considered to control it perfectly. To show the efficacy of the FOSOFC controller, the obtained performance is compared with fractional order fuzzy proportional integral and derivative (FOFPID) controller for study in servo as well as the regulatory problems

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Control of new type of fractional chaos synchronization

Based on stability theory of linear fractional order systems and stability theory of linear integer order systems, the problem of coexistence of various types of synchronization between different dimensional fractional chaotic systems is investigated in this paper. Numerical and simulation results have clearly shown the effectiveness of the novel approach developed herein. © 2018, Springer International Publishing AG.

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Real-Time Dorsal Hand Recognition Based on Smartphone

The integration of biometric recognition with smartphones is necessary to increase security, especially in financial transactions such as online payments. Vein recognition of the dorsal hand is superior to other methods such as palm, finger, and wrist, as it has a wide area to be captured and does not have any wrinkles. Most current systems that depend on dorsal hand vein recognition do not work in real-time and have poor results. In this paper, a dorsal hand recognition system working in real-time is proposed to achieve good results with a high frame rate. A contactless device consists of a

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Assessment of cardiac mass from tagged magnetic resonance images

Purpose: Tagged and cine magnetic resonance imaging (tMRI and cMRI) techniques are used for evaluating regional and global heart function, respectively. Measuring global function parameters directly from tMRI is challenging due to the obstruction of the anatomical structure by the tagging pattern. The purpose of this study was to develop a method for processing the tMRI images to improve the myocardium-blood contrast in order to estimate global function parameters from the processed images. Materials and methods: The developed method consists of two stages: (1) removing the tagging pattern

Artificial Intelligence
Healthcare
Circuit Theory and Applications
Software and Communications

Native Mobile Applications UI Code Conversion

With the widespread use of mobile applications in daily life, it has become crucial for software companies to develop the applications for the most popular platforms like Android and iOS. Using a native development is time consuming and costly. Cross-platform mobile development like Xamarin and React native emerged as a solution to the mentioned problem of native development for the time and cost. Meanwhile it requires the developers to learn a new language. Other tools are converting the mobile apps of specific platform to the corresponding platform, but most of them still lack the mobile

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Stock exchange threat modeling, EGX as a case study

Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions

Artificial Intelligence
Innovation, Entrepreneurship and Competitiveness