
Early detection of hepatocellular carcinoma co-occurring with hepatitis C virus infection: A mathematical model
AIM: To develop a mathematical model for the early detection of hepatocellular carcinoma (HCC) with a panel of serum proteins in combination with α-fetoprotein (AFP). METHODS: Serum levels of interleukin (IL)-8, soluble intercellular adhesion molecule-1 (sICAM-1), soluble tumor necrosis factor receptor II (sTNF-R II), proteasome, and β-catenin were measured in 479 subjects categorized into four groups: (1) HCC concurrent with hepatitis C virus (HCV) infection (n = 192); (2) HCV related liver cirrhosis (LC) (n = 96); (3) Chronic hepatitis C (CHC) (n = 96); and (4) Healthy controls (n = 95). The

Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption
We present a simple yet highly dimensional hybrid diode bridge circuit network that can exhibit complex chaotic behaviours. Further, since our network is characterised by smooth fourth-order exponential nonlinearity, we employ a distinctive approach to assess its different properties: we examine the circuit stability near fixed points. Specifically, we evaluate dynamic complexity using the Lyaponov spectrum analysis, bifurcation analysis and phase space trajectories; additionally, we assess coexisting attractors in the parameter space using numerical and experimental analysis. Furthermore, we

Dominant Data Set Selection Algorithms for Electricity Consumption Time-Series Data Analysis Based on Affine Transformation
In the explosive growth of time-series data (TSD), the scale of TSD suggests that the scale and capability of many Internet of Things (IoT)-based applications has already been exceeded. Moreover, redundancy persists in TSD due to the correlation between information acquired via different sources. In this article, we propose a cohort of dominant data set selection algorithms for electricity consumption TSD with a focus on discriminating the dominant data set that is a small data set but capable of representing the kernel information carried by TSD with an arbitrarily small error rate less than

Deploying machine and deep learning models for efficient data-augmented detection of COVID-19 infections
This generation faces existential threats because of the global assault of the novel Corona virus 2019 (i.e., COVID-19). With more than thirteen million infected and nearly 600000 fatalities in 188 countries/regions, COVID-19 is the worst calamity since the World War II. These misfortunes are traced to various reasons, including late detection of latent or asymptomatic carriers, migration, and inadequate isolation of infected people. This makes detection, containment, and mitigation global priorities to contain exposure via quarantine, lockdowns, work/stay at home, and social distancing that

Dyadchurn: Customer churn prediction using strong social ties
The increase in mobile phone subscriptions in recent years, has led to near market saturation in the telecom industry. As a result, it has become harder for telecom providers to acquire new customers, and the need for retaining existing ones has become of paramount importance. Because of fierce competition between different telecom providers and because the ease of which customers can move from one provider to another, all telecom service providers suffer from customer churn. In this paper, we propose a dyadic based churn prediction model, DyadChurn, where customer churn is modeled through

MicroTarget: MicroRNA target gene prediction approach with application to breast cancer
MicroRNAs are known to play an essential role in gene regulation in plants and animals. The standard method for understanding microRNA-gene interactions is randomized controlled perturbation experiments. These experiments are costly and time consuming. Therefore, use of computational methods is essential. Currently, several computational methods have been developed to discover microRNA target genes. However, these methods have limitations based on the features that are used for prediction. The commonly used features are complementarity to the seed region of the microRNA, site accessibility

A Context Integrated Model for Multi-label Emotion Detection
This paper explores the impact of taking the environment within which a tweet is made, on the task of analyzing sentiment orientations of tweets produced by people in the same community. The paper proposes C-GRU (Context-aware Gated Recurrent Units), which extracts the contextual information (topics) from tweets and uses them as an extra layer to determine sentiments conveyed by the tweet. The proposed architecture learns direct co-relations between such information and the task's predication. The multi-modal model combines both outputs learnt (from topics and sentences) by learning the

Decoding arm kinematics from EMG signals using Kalman filter
Myoelectric control of prosthetic arms provides a new hope for providing naturalistic movements to amputees. Extensive work has been made in recent years to use Electromyography (EMG) signals to enhance the operation of prosthetic arms. In this paper, we propose an EMG Kalman filter-based model, where we identify the relationship between the joint angles and recorded EMG signals. EMG signals were recorded from biceps and triceps muscles and used to train a Kalman filter decoder. We assessed the performance of the decoder by computing the correlation and the normalized root mean-square error

Vehicle Software Update over ICN Architectures
The Internet Protocol (IP) architecture could not fully satisfy Vehicular Ad-hoc Networks (VANETs) needed efficiency due to their dynamic topology and high mobility. This paper presents a technique to update the software of Electronic Control Units (ECUs) in vehicles using Information Centric Network (ICN) architecture. The proposed technique replaces Flashing Over The Air (FOTA) using IP with FOTA using ICN. The importance of FOTA is illustrated as well as the impact of applying the ICN architecture on VANETs. Through our experiments, we compare between the known FOTA over IP and the newly

A new static-based framework for ransomware detection
Recently, ransomware attacks are on the rise hitting critical infrastructures and organizations globally. Ransomware uses advanced encryption techniques to encrypt important files on the targeted computer, then it requests payment to decrypt the encrypted files again. Therefore, the detection and prevention of ransomware attacks represent major challenges for security researchers. This research proposes a novel static-based rules ransomware detection framework. The decision rules of the proposed framework are based on static features extracted from the ransomware files. When scanned file
Pagination
- Previous page ‹‹
- Page 10
- Next page ››