423 research outputs found

    Colorectal Cancer Classification from Protein Sequences Using Several RNN Pre-Trained Models

    Get PDF
    Bioinformatics is one field that can integrate health information with data mining applications in order to predict or analyze the patient’s information. One among the several diseases is colorectal cancer,which is horrible and rated the third leading disease in the area of cancer which leads to death in both men and women.In general, there are several intelligent methods to identify several kinds of problems in gene selection for predicting cancer,but there is no method to give a solution for patients who are diagnosed in the advanced stage.This motivated me to design theproposed approach in which we try to identify all the homo protein sequences and then train these sequences corresponding to one which causes colorectal cancer.InBioinformatics,a protein acts as one of the main agent or source to perform a biological function by interacting with molecules like Deoxyribonucleic acid (DNA), Ribonucleic acid (RNA). The function of a protein determines the healthy or diseased states of an organism. Protein interaction with other proteins can be visualized through a network called Protein-Protein Interaction Network (PPIN).In general classification of protein sequences is a very complex task. Deep learning techniques like CNN and RNN can be used to solve the problem.In computational bioinformatics,the classification of protein sequence plays an important role in determining accuracy.To improve the accuracy of our current model, the suggested method incorporates GRU, LSTM, RNN, and Customized LSTM into an RNN based architecture by optimizing the parameters in a two-way direction.Here we try to test all the models on sample protein sequences that are collected from TCGA and then determine the correctness of testing data and training data

    Dolphin landings

    Get PDF
    A female bottlenose dolphin, Tursiops truncatus measuring 225 cm and weighing 160 kg landed at Kakinada on 28 Apri

    THE CHARACTERIZED CONCEPT OF VAGUE CO-FRAMES

    Get PDF
    In this paper we introduce vague frame, vague co- frames, vague frame generated by frame and investigate some of its basic properties. In particular, some interesting characterizations closely related to the vague co- frames and vague cut sets on vague co-frame are given also studied their properties. Further we investigate the development of some important results and theorems about vague cut sets on vague co-frame

    Simplified procedures for the generation of POPSI entries using computer

    Get PDF
    In this paper, we are presenting two programs for generating POPSI entries, in which the first program is general in its application, in the sense that the input codes decide the formation of entries especially the context terms and the second, which does not take any extra codes at the input and formulates the entries accord- ing to a single rule

    Improved Privacy Preserving Profile Matching in Online Social Networks

    Get PDF
    Social networking  became popular because of its digital  communication technologies  tools  for  extending  the  social  circle  of  people.  Privacy preservation became a significant  issue  in  social  networking. This work discussed user profile matching  with  privacy preservation and introduced a group of   profile  matching  protocols. Online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. To the best of our knowledge, this is the first work that uses operation-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles

    The Oceans

    Get PDF

    COMBINATION KEYWORD QUERIES WITH SELECTED TESTER AND TIMING FACILITATE IN ALTERNATIVE RECRYPTOGRAPY FUNCTION

    Get PDF
    A microcomputer vigor file profit is usually an extraordinary inquiry that will lead outstanding comfort in vigor thought. Within that stationery, we admit a uncommon cryptographic rudimentary deputed as agreed magic formula scrutinize along inventive physicist and improve warranted representative re-polish encryption serve as, whatever is actually a variety of a cycle-dependent SE procedure. We devise an exceptional inspecting a position sharpen encryption form forget confederated secret sign probe and affirmed conveyance serve as. The questing a position catalogue encryption (SE) plots can be a robotics to consist of aegis shelter and advocate in a position operability serve as in combination, that could comedy a enormous act among in the e-lustiness post scheme. In hang to current schemes, destruction cut the mustard rank approved representative re-register encryption near compelling conveyance cancellation. The insurance and solitude of your receptive deepest dossier often is the notable concerns on the users which could inhibit similarly conclusion and universally acceptance on the strategies. It may perhaps prepare patients to hand over partial get right of entry to freedoms to folks to serve as investigate serve ass left over their lists in a little while discontinuance. The length of your time frame yet designate to glance and break the delegator’s encrypted documents may well be orderly. The connection and lengthy simulations prove it contains a low guess and storage cost. We develop one way wear along a pact image nonetheless indicated Re-dtPECK aim to show off that other it's a no one's stuff propose demonstrated defend amidst in the same old prototype. The momentary results and freedom inquiry point out our draft holds so much grander precaution when compared with current solutions with a reasoning a position utilities for muddy claims

    BUILD A SYSTEM TO EXTRACT DATA AND DISCOVERING BY USING FS ALGORITHM

    Get PDF
    It continues to provide an example of how to use filters, such as the Flexible Selection of Mutual Information Feature. FMIFS is an upgrade of MIFS and MMIFS. The FMIFS recommends adapting the Battiti sample to minimize value sharing. FMIFS consumes the cycle required by MIFS and MMIFS.FMIFS to enhance MIFS and MMIFS. The FMIFS recommends adapting the Battiti sample to minimize value sharing. FMIFS ignored the highest level of replication required in MIFS and MMIFS. Currently, there are solutions that can be completely prevented from completely preventing the Internet and computer programs from threatening the use of mobile phones by hackers and computer attacks and malware in the United States. Current business information, often large, presents a significant challenge to IDS. Examinations of studies show that our organization of specialized options helps the LSSVM-IDS to achieve a better degree in reducing cost comparison compared to the art of art. This build is based on the design of selected statistics designed for statistical and non-reliability records. In this form, we recommend a basic doctor to provide information that defines the full meaning of the classification. Its value must be calculated within the certification rate of the attack. Impossible and unpredictable information has led to a long period of time in the distribution of telecommunication trade. These tasks not only slow down the entire design process, not just protect a person who is making the right decisions, especially when faced with important information

    Halogen nuclear magnetic resonance shifts. Part I. Cl<SUP>35</SUP> resonance in alkali chlorides

    Get PDF
    The nuclear magnetic resonance shifts (chemical shifts) of Cl35 in aqueous solutions of alkali chlorides were determined using a High Resolution NMR Spectrometer. These small shifts probably represent the effect of the neighbouring atom even in the highly ionic state. A similarity of these results to the quadrupole coupling constants of the halogen atom in these molecules is pointed out
    corecore