44 research outputs found

    Transmissibility prediction of coronavirus disease (covid-19) outbreak in early stages

    Get PDF
    The Covid-19 pandemic is still ongoing around the world. This study aims to predict the reproduction number, R0 for Covid-19 to measure the infectious level of this disease to the general population. To predict the reproduction number, a prediction method using the Probability Mass function is used with the dataset for the Covid-19 disease. This result has been divided into the first wave, second wave and third wave which suggest that the R0 is increased which correlate with the new strain of Covid-19 mutation “D614G” that is more infectious compared to the first wave strain. In a nutshell, with the R0 has been predicted, a containment plan is possible to curb the disease from spreading even further to the general population

    Survival analysis for the identified cancer gene subtype from the co-clustering algorithm

    Get PDF
    Cancer gene subtype information is significant for understanding tumour heterogeneity. The early detection of cancer and subsequent treatment can be lifesaving. However, it is hard clinically and computationally to detect cancer and its subtypes in their early stages. Therefore, we extend the analysis and results from Machap et al. (2019), to include the KaplanMeier survival analysis with the integration of gene expression and clinical features data. There are two cancer datasets used for the analysis : breast cancer and glioblastoma multiforme. The luminal type was the common subtype of breast cancer, showing a higher survival rate. Whereas the Proneural subtype in glioblastoma multiforme has a little longer survival rate than the other three subtypes. These molecular differences between subtypes have been shown to correlate very well with clinical features and survival parameters to help understand the disease and develop better therapeutic targets

    Driver alcohol monitoring system for vehicle safety control with emergency contact

    Get PDF
    An intelligent alcohol detection and speed limiting system is proposed using Arduino A new approach is being described to identify drunk drivers and set limitations to functionalities of their vehicles to force drivers to completely stop whenever the blood alcohol content (BAC) level is higher than the approvable limitation which is 0 08 mg/L alcohol, that is equivalent to 180 PPM in this project

    The importance of data classification using machine learning methods in microarray data

    Get PDF
    The detection of genetic mutations has attracted global attention. several methods have proposed to detect diseases such as cancers and tumours. One of them is microarrays, which is a type of representation for gene expression that is helpful in diagnosis. To unleash the full potential of microarrays, machine-learning algorithms and gene selection methods can be implemented to facilitate processing on microarrays and to overcome other potential challenges. One of these challenges involves high dimensional data that are redundant, irrelevant, and noisy. To alleviate this problem, this representation should be simplified. For example, the feature selection process can be implemented by reducing the number of features adopted in clustering and classification. A subset of genes can be selected from a pool of gene expression data recorded on DNA micro-arrays. This paper reviews existing classification techniques and gene selection methods. The effectiveness of emerging techniques, such as the swarm intelligence technique in feature selection and classification in microarrays, are reported as well. These emerging techniques can be used in detecting cancer. The swarm intelligence technique can be combined with other statistical methods for attaining better results

    A Blind Multiple Watermarks based on Human Visual Characteristics

    Get PDF
    Digital watermarking is an alternative solution to prevent unauthorized duplication, distribution and breach of ownership right. This paper proposes a watermarking scheme for multiple watermarks embedding. The embedding of multiple watermarks use a block-based scheme based on human visual characteristics. A threshold is used to determine the watermark values by modifying first column of the orthogonal U matrix obtained from Singular Value Decomposition (SVD). The tradeoff between normalize cross-correlation and imperceptibility of watermarked image from quantization steps was used to achieve an optimal threshold value. The results show that our proposed multiple watermarks scheme exhibit robustness against signal processing attacks. The proposed scheme demonstrates that the watermark recovery from chrominance blue was resistant against different types of attacks

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition

    Get PDF
    In order to improve the classification accuracy in the field of handwriting character recognition (HCR), the number of derivative algorithms has improved and the interest in feature extraction has increased. In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. WOA is a swarm-based techniques that mimic the social behavior of groups of animals, which mimics the social behavior of humpback whales. Freeman chaincode (FCC) is utilised as a data representations of handwritten text images. Nevertheless, the representations of FCC depends on the length of the path and the branching of the character’s nodes. To solve this problem, we propose a metaheuristic approach through WOA to find the shortest path length and minimum computational time for handwriting recognition. Finally, the results were compared with the existing proposed Flower Pollination Algorithm (FPA) at the time of FCC extraction. The results show that WOA is a bit better at getting shorter path lengths than FPA in terms of path lengths. In terms of calculation time, WOA calculates faster calculation time by feature extraction than FPA

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys

    Get PDF
    The security of stored templates has become an important issue in biometric authentication systems this because most of the biometric attacks target the biometric database beside the difficulty of issuing the templates again. Thus, to protect the biometric templates it must be encrypted before storing in database. In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. The proposed encryption method provides sufficient security and protection for the biometric templates from attacks, where the experimental results showed high efficiency comparing with the traditional Hill Cipher and existing methods

    Optical character recognition using backpropagation neural network for handwritten digit characters

    Get PDF
    Recognizing handwritten characters, the accuracy of the optical character recognition is usually not relatively high due to every person having their unique way of writing characters. Therefore, we focus on finding a high recognition accuracy of optical character recognition by using a backpropagation neural network. The input layer of the backpropagation neural network is the pixel number of the one-character image, which is 784 input nodes that will be the input layer of the neural network. Then the output layer of the neural network will be the 10-digit characters which are 0 to 9. The dataset that used for this research has a total of 280,000 data. The output of the neural network will a computerized digit representing the recognized digit characters. The performance measurement is the recognition accuracy where the recognized data and the expected output data are compared and calculated. Additionally, the dataset was applied with salt and pepper noise to represent the corrupted data and use a median filter to repair the image. The recognition accuracy for the corrupted image and the corrected image are obtained and discussed

    An Improved Parallelized mRMR for Gene Subset Selection in Cancer Classification

    Get PDF
    DNA microarray technique has become a more attractive tool for cancer classification in the scientific and industrial fields. Based on the previous researchers, the conventional approach for cancer classification is primarily based on morphological appearance of the tumor. The limitations of this approach are bias in identify the tumors by expert and faced the difficulty in differentiate the cancer subtypes due to most cancers being highly related to the specific biological insight.  Thus, this study propose an improved parallelized Minimum Redundancy Maximum Relevance (mRMR), which is a particularly fast feature selection method for finding a set of both relevant and complementary features. The mRMR can identify genes more relevance to biological context that leads to richer biological interpretations. The proposed method is expected to achieve accurate classification performance using small number of predictive genes when tested using two datasets from Cancer Genome Project and compared to previous methods

    A new hybrid teaching learning based optimization -extreme learning machine model based intrusion-detection system

    Get PDF
    Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a single algorithm. But even so, the hybrid models based on traditional algorithms still face different limitations. This work is focused on providing two main goals; firstly, analysis based on the main methods and limitations of the most-recent hybrid model-based on intrusion detection, secondly, to propose a novel hybrid IDS model called TLBO-ELM based on the Firefly algorithm and Fast Learning Network
    corecore