Deep learning enhanced the state-of-the-art methods in genomics allows it to be used
in analysing the biological data with high prediction. The training process of neural network with
several hidden layers which has been facilitated by deep learning has been subjected into
increased interest in achieving remarkable results in various fields. Thus, the extraction of
bioprocess production can be implemented by pathway prediction in genomic metabolic network
in eschericia coli. As metabolic engineering involves the manipulation of genes which have the
potential to increase the yield of metabolite production. A mathematical model of this network is
the foundation for the development of computational procedure that directs genetic
manipulations that would eventually lead to optimized bioprocess production. Due to the ability
of deep learning to be well suited in terms of genomics, modelling for biological network can be
implemented. Each layer reveal the insight of biological network which enable pathway analysis
to be implemented in order to extract the target bioprocess production. In this study, deep
neural network has been to identify any set of gene deletion models that offers optimal results in
xylitol production and its growth yield.
Particle Swarm Optimization for Gene cluster IdentificationEditor IJCATR
The understanding of gene regulation is the most basic need for the classification of genes within a DNA. These genes
within the DNA are grouped together into clusters also known as Transcription Units. The genes are grouped into transcription units
for the purpose of construction and regulation of gene expression and synthesis of proteins. This knowledge further contributes as
essential information for the process of drug design and to determine the protein functions of newly sequenced genomes. It is possible
to use the diverse biological information across multiple genomes as an input to the classification problem. The purpose of this work is
to show that Particle Swarm Optimization may provide for more efficient classification as compared to other algorithms. To validate
the approach E.Coli complete genome is taken as the benchmark genome.
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORKijbbjournal
Gene Regulatory Network (GRN) plays an important role in knowing insight of cellular life cycle. It gives
information about at which different environmental conditions genes of particular interest get over
expressed or under expressed. Modelling of GRN is nothing but finding interactive relationships between
genes. Interaction can be positive or negative. For inference of GRN, time series data provided by
Microarray technology is used. Key factors to be considered while constructing GRN are scalability,
robustness, reliability and maximum detection of true positive interactions between genes. This paper
gives detailed technical review of existing methods applied for building of GRN along with scope for
future work.
Multiple Features Based Two-stage Hybrid Classifier Ensembles for Subcellular...CSCJournals
Subcellular localization is a key functional characteristic of proteins. As an interesting ``bio-image informatics\'\' application, an automatic, reliable and efficient prediction system for protein subcellular localization can be used for establishing knowledge of the spatial distribution of proteins within living cells and permits to screen systems for drug discovery or for early diagnosis of a disease. In this paper, we propose a two-stage multiple classifier system to improve classification reliability by introducing rejection option. The system is built as a cascade of two classifier ensembles. The first ensemble consists of set of binary SVMs which generalizes to learn a general classification rule and the second ensemble, which also include three distinct classifiers, focus on the exceptions rejected by the rule. A new way to induce diversity for the classifier ensembles is proposed by designing classifiers that are based on descriptions of different feature patterns. In addition to the Subcellular Location Features (SLF) generally adopted in earlier researches, three well-known texture feature descriptions have been applied to cell phenotype images, which are the local binary patterns (LBP), Gabor filtering and Gray Level Coocurrence Matrix (GLCM). The different texture feature sets can provide sufficient diversity among base classifiers, which is known as a necessary condition for improvement in ensemble performance. Using the public benchmark 2D HeLa cell images, a high classification accuracy 96% is obtained with rejection rate $21\\%$ from the proposed system by taking advantages of the complementary strengths of feature construction and majority-voting based classifiers\' decision fusions.
Particle Swarm Optimization for Gene cluster IdentificationEditor IJCATR
The understanding of gene regulation is the most basic need for the classification of genes within a DNA. These genes
within the DNA are grouped together into clusters also known as Transcription Units. The genes are grouped into transcription units
for the purpose of construction and regulation of gene expression and synthesis of proteins. This knowledge further contributes as
essential information for the process of drug design and to determine the protein functions of newly sequenced genomes. It is possible
to use the diverse biological information across multiple genomes as an input to the classification problem. The purpose of this work is
to show that Particle Swarm Optimization may provide for more efficient classification as compared to other algorithms. To validate
the approach E.Coli complete genome is taken as the benchmark genome.
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORKijbbjournal
Gene Regulatory Network (GRN) plays an important role in knowing insight of cellular life cycle. It gives
information about at which different environmental conditions genes of particular interest get over
expressed or under expressed. Modelling of GRN is nothing but finding interactive relationships between
genes. Interaction can be positive or negative. For inference of GRN, time series data provided by
Microarray technology is used. Key factors to be considered while constructing GRN are scalability,
robustness, reliability and maximum detection of true positive interactions between genes. This paper
gives detailed technical review of existing methods applied for building of GRN along with scope for
future work.
Multiple Features Based Two-stage Hybrid Classifier Ensembles for Subcellular...CSCJournals
Subcellular localization is a key functional characteristic of proteins. As an interesting ``bio-image informatics\'\' application, an automatic, reliable and efficient prediction system for protein subcellular localization can be used for establishing knowledge of the spatial distribution of proteins within living cells and permits to screen systems for drug discovery or for early diagnosis of a disease. In this paper, we propose a two-stage multiple classifier system to improve classification reliability by introducing rejection option. The system is built as a cascade of two classifier ensembles. The first ensemble consists of set of binary SVMs which generalizes to learn a general classification rule and the second ensemble, which also include three distinct classifiers, focus on the exceptions rejected by the rule. A new way to induce diversity for the classifier ensembles is proposed by designing classifiers that are based on descriptions of different feature patterns. In addition to the Subcellular Location Features (SLF) generally adopted in earlier researches, three well-known texture feature descriptions have been applied to cell phenotype images, which are the local binary patterns (LBP), Gabor filtering and Gray Level Coocurrence Matrix (GLCM). The different texture feature sets can provide sufficient diversity among base classifiers, which is known as a necessary condition for improvement in ensemble performance. Using the public benchmark 2D HeLa cell images, a high classification accuracy 96% is obtained with rejection rate $21\\%$ from the proposed system by taking advantages of the complementary strengths of feature construction and majority-voting based classifiers\' decision fusions.
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...CSCJournals
The Internet paved way for information sharing all over the world decades ago and its popularity for distribution of data has spread like a wildfire ever since. Data in the form of images, sounds, animations and videos is gaining users’ preference in comparison to plain text all across the globe. Despite unprecedented progress in the fields of data storage, computing speed and data transmission speed, the demands of available data and its size (due to the increase in both, quality and quantity) continue to overpower the supply of resources. One of the reasons for this may be how the uncompressed data is compressed in order to send it across the network. This paper compares the two most widely used training algorithms for multilayer perceptron (MLP) image compression – the Levenberg-Marquardt algorithm and the Scaled Conjugate Gradient algorithm. We test the performance of the two training algorithms by compressing the standard test image (Lena or Lenna) in terms of accuracy and speed. Based on our results, we conclude that both algorithms were comparable in terms of speed and accuracy. However, the Levenberg- Marquardt algorithm has shown slightly better performance in terms of accuracy (as found in the average training accuracy and mean squared error), whereas the Scaled Conjugate Gradient algorithm faired better in terms of speed (as found in the average training iteration) on a simple MLP structure (2 hidden layers).
Optimized Neural Network for Classification of Multispectral ImagesIDES Editor
The proposed work involves the multiobjective PSO
based optimization of artificial neural network structure for
the classification of multispectral satellite images. The neural
network is used to classify each image pixel in various land
cove types like vegetations, waterways, man-made structures
and road network. It is per pixel supervised classification using
spectral bands (original feature space). Use of neural network
for classification requires selection of most discriminative
spectral bands and determination of optimal number of nodes
in hidden layer. We propose new methodology based on
multiobjective particle swarm optimization (MOPSO) to
determine discriminative spectral bands and the number of
hidden layer node simultaneously. The result obtained using
such optimized neural network is compared with that of
traditional classifiers like MLC and Euclidean classifier. The
performance of all classifiers is evaluated quantitatively using
Xie-Beni and â indexes. The result shows the superiority of
the proposed method.
A Multiset Rule Based Petri net Algorithm for the Synthesis and Secretary Pat...ijsc
Membrane computing is a branch of Natural computing aiming to abstract computing models from the structure and functioning of the living cell. A comprehensive introduction to membrane computing is meant to offer both computer scientists and non-computer scientists an up-to date overview of the field. In
this paper, we consider a uniform way of treating objects and rules in P Systems with the help of Multiset rewriting rules. Here the synthesis and secretary pathway of glycoprotein in epithelial cells of small intestine is considered as an example. A natural and finite link is explored between Petri nets and membrane Computing. A Petri net (PN) algorithm combined with P Systems is implemented for the synthesis and secretary pathway of Glycoprotein. To capture the compartmentalization of P Systems, the Petri net is extended with localities and to show how to adopt the notion of a Petri net process accordingly.
The algorithm uses symbolic representations of multisets of rules to efficiently generate all the regions associated with the membrane. In essence, this algorithm is built from transport route sharing a set of places modeling the availability of system resources. The algorithm when simulated shows a significant
pathway of safe Petri nets.
MULTI-LEVEL FEATURE FUSION BASED TRANSFER LEARNING FOR PERSON RE-IDENTIFICATIONijaia
Most of the currently known methods treat person re-identification task as classification problem and used commonly neural networks. However, these methods used only high-level convolutional feature or to express the feature representation of pedestrians. Moreover, the current data sets for person reidentification is relatively small. Under the limitation of the number of training set, deep convolutional networks are difficult to train adequately. Therefore, it is very worthwhile to introduce auxiliary data sets to help training. In order to solve this problem, this paper propose a novel method of deep transfer learning, and combines the comparison model with the classification model and multi-level fusion of the convolution features on the basis of transfer learning. In a multi-layers convolutional network, the characteristics of each layer of network are the dimensionality reduction of the previous layer of results, but the information of multi-level features is not only inclusive, but also has certain complementarity. We can using the information gap of different layers of convolutional neural networks to extract a better feature expression. Finally, the algorithm proposed in this paper is fully tested on four data sets (VIPeR, CUHK01, GRID and PRID450S). The obtained re-identification results prove the effectiveness of the algorithm.
Understanding Protein Function on a Genome-scale through the Analysis of Molecular Networks
Cornell Medical School, Physiology, Biophysics and Systems Biology (PBSB) graduate program, 2009.01.26, 16:00-17:00; [I:CORNELL-PBSB] (Long networks talk, incl. the following topics: why networks w. amsci*, funnygene*, net. prediction intro, memint*, tse*, essen*, sandy*, metagenomics*, netpossel*, tyna*+ topnet*, & pubnet* . Fits easily into 60’ w. 10’ questions. PPT works on mac & PC and has many photos w. EXIF tag kwcornellpbsb .)
Date Given: 01/26/2009
Protein structure prediction is the inference of the three-dimensional structure of a protein from its amino acid sequence—that is, the prediction of its folding and its secondary and tertiary structure from its primary structure. Structure prediction is fundamentally different from the inverse problem of protein design. Protein structure prediction is one of the most important goals pursued by bioinformatics and theoretical chemistry; it is highly important in medicine (for example, in drug design) and biotechnology (for example, in the design of novel enzymes).
A multiple sequence alignment (MSA) is a sequence alignment of three or more biological sequences, generally protein, DNA, or RNA. In many cases, the input set of query sequences are assumed to have an evolutionary relationship by which they share a linkage and are descended from a common ancestor. From the resulting MSA, sequence homology can be inferred and phylogenetic analysis can be conducted to assess the sequences' shared evolutionary origins.
Homology modeling, also known as comparative modeling of protein, refers to constructing an atomic-resolution model of the "target" protein from its amino acid sequence and an experimental three-dimensional structure of a related homologous protein (the "template"). Homology modeling relies on the identification of one or more known protein structures likely to resemble the structure of the query sequence, and on the production of an alignment that maps residues in the query sequence to residues in the template sequence has been shown that protein structures are more conserved than protein sequences amongst homologues, but sequences falling below a 20% sequence identity can have very different structure.
Computational Analysis of RNA Nucleotide Sequencesijtsrd
One of the most fascinating and deeply researched fields of all of the biochemical components are the nucleic acids and proteins, especially because of their dynamic structure and function and their fundamental role in the course of evolution. Sequence studies have been carried out and is still being researched on to decode completely the world of genetics and molecular biology. And so, here we present our concept in the form of a simple program that has been developed for analyzing the Amino acid sequence from a given sequence of RNA nucleotide bases, and using the result of which, further, interpretation of the corresponding protein can be done. Shall Juneja | Deepayan Mukherjee | Sachi Garg "Computational Analysis of RNA Nucleotide Sequences" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21342.pdf
Paper URL: https://www.ijtsrd.com/biological-science/bioinformatics/21342/computational-analysis-of-rna-nucleotide-sequences/shall-juneja
Membrane proteins play important roles in various cellular processes, such as cell adhesion, immune response, metabolism and signal transduction. They are popular targets for proteomics research and the common candidates for drug development. Shotgun proteomics methods are available for the identification of membrane proteins.
A New Method for Figuring the Number of Hidden Layer Nodes in BP Algorithmrahulmonikasharma
In the field of artificial neural network, BP neural network is a multi-layer feed-forward neural network. Because it is difficult to figure the number of hidden layer nodes in a BP neural network, the theoretical basis and the existing methods for BP network hidden layer nodes are studied. Then based on traditional empirical formulas, we propose a new approach to rapidly figure the quantity of hidden layer nodes in two-layer network. That is, with the assistance of experience formulas, the horizon of unit number in hidden layer can be confirmed and its optimal value will be found in this horizon. Finally, a new formula for figuring the quantity of hidden layer codes is obtained through fitting input dimension, output dimension and the optimal value of hidden layer codes. Under some given input dimension and output dimension, efficiency and precision of BP algorithm may be improved by applying the proposed formula.
RunPool: A Dynamic Pooling Layer for Convolution Neural NetworkPutra Wanda
Deep learning (DL) has achieved a significant performance in computer vision problems, mainly in automatic feature extraction and representation. However, it is not easy to determine the best pooling method in a different case study. For instance, experts can implement the best types of pooling in image processing cases, which might not be optimal for various tasks. Thus, it is
required to keep in line with the philosophy of DL. In dynamic neural network architecture, it is not practically possible to find
a proper pooling technique for the layers. It is the primary reason why various pooling cannot be applied in the dynamic and multidimensional dataset. To deal with the limitations, it needs to construct an optimal pooling method as a better option than max pooling and average pooling. Therefore, we introduce a dynamic pooling layer called RunPool to train the convolutional
neuralnetwork(CNN)architecture.RunPoolpoolingisproposedtoregularizetheneuralnetworkthatreplacesthedeterministic
pooling functions. In the final section, we test the proposed pooling layer to address classification problems with online social network (OSN) dataset
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized.The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient(MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and
C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...TELKOMNIKA JOURNAL
The flavivirus epidemiology has reached an alarming rate which haunts the world population
including Malaysia. World Health Organization has proposed and practised various methods of vector
control through environmental management, chemical and biological orientations. However, from the listed
control vectors, the most crucial part to be heeded are non-accessible places like water storage and
artificial container. The objective of the study was to acquire and compare various accuracies and crossentropy
errors of the training sets within different learning rates in water storage tank environment which
was essential for detection. This experiment performed transfer learning where Inception-V3 was
implemented. About 534 images were trained to classify between Aedes Aegypti larvae and float valve
within 3 different learning rates. For training accuracy and validation accuracy, learning rates were 0.1;
99.98%, 99.90% and 0.01; 99.91%, 99.77% and 0.001; 99.10%, 99.93%. Cross-entropy errors for training
and validation for 0.1 were 0.0021, 0.0184 whereas for 0.01 were 0.0091, 0.0121 and 0.001; 0.0513,
0.0330. Various accuracies and cross-entropy errors of the training sets within the different learning rates
were successfully acquired and compared.
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...IAEME Publication
This paper presents an approach based on applying an aggregated predictor formed by multiple versions of a multilayer neural network with a back-propagation optimization algorithm for helping the engineer to get a list of the most appropriate well-test interpretation models for a given set of pressure/ production data. The proposed method consists of three stages: (1) data decorrelation through principal component analysis to reduce the covariance between the variables and the dimension of the input layer in the artificial neural network, (2) bootstrap replicates of the learning set where the data is repeatedly sampled with a random split of the data into train sets and using these as new learning sets, and (3) automatic reservoir model identification through aggregated predictor formed by a plurality vote when predicting a new class. This method is described in detail to ensure successful replication of results. The required training and test dataset were generated by using analytical solution models. In our case, there were used 600 samples: 300 for training, 100 for cross-validation, and 200 for testing. Different network structures were tested during this study to arrive at optimum network design. We notice that the single net methodology always brings about confusion in selecting the correct model even though the training results for the constructed networks are close to 1. We notice also that the principal component analysis is an effective strategy in reducing the number of input features, simplifying the network structure, and lowering the training time of the ANN. The results obtained show that the proposed model provides better performance when predicting new data with a coefficient of correlation approximately equal to 95% Compared to a previous approach 80%, the combination of the PCA and ANN is more stable and determine the more accurate results with lesser computational complexity than was feasible previously. Clearly, the aggregated predictor is more stable and shows less bad classes compared to the previous approach.
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...ijtsrd
Convolutional Neural Network CNN designs can successfully classify, predict and cluster in many artificial intelligence applications. In the health sector, intensive studies continue for disease classification. When the literature in this field is examined, it is seen that the studies are concentrated on the health sector. Thanks to these studies, doctors can make an accurate diagnosis by examining radiological images more consistently. In addition, doctors can save time to do other patient work by using CNN. In this study, related current manuscripts in the health sector were examined. The contributions of these publications to the literature were explained and evaluated. Complementary and contradictory arguments of the presented perspectives were revealed. It has been stated that the current status of the studies carried out and in which direction the future studies should evolve and that they can make an important contribution to the literature. Suggestions have been made for the guidance for future studies. Ahmet Özcan | Mahmut Ünver | Atilla Ergüzen "A Survey of Convolutional Neural Network Architectures for Deep Learning via Health Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49156.pdf Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/49156/a-survey-of-convolutional-neural-network-architectures-for-deep-learning-via-health-images/ahmet-özcan
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...CSCJournals
The Internet paved way for information sharing all over the world decades ago and its popularity for distribution of data has spread like a wildfire ever since. Data in the form of images, sounds, animations and videos is gaining users’ preference in comparison to plain text all across the globe. Despite unprecedented progress in the fields of data storage, computing speed and data transmission speed, the demands of available data and its size (due to the increase in both, quality and quantity) continue to overpower the supply of resources. One of the reasons for this may be how the uncompressed data is compressed in order to send it across the network. This paper compares the two most widely used training algorithms for multilayer perceptron (MLP) image compression – the Levenberg-Marquardt algorithm and the Scaled Conjugate Gradient algorithm. We test the performance of the two training algorithms by compressing the standard test image (Lena or Lenna) in terms of accuracy and speed. Based on our results, we conclude that both algorithms were comparable in terms of speed and accuracy. However, the Levenberg- Marquardt algorithm has shown slightly better performance in terms of accuracy (as found in the average training accuracy and mean squared error), whereas the Scaled Conjugate Gradient algorithm faired better in terms of speed (as found in the average training iteration) on a simple MLP structure (2 hidden layers).
Optimized Neural Network for Classification of Multispectral ImagesIDES Editor
The proposed work involves the multiobjective PSO
based optimization of artificial neural network structure for
the classification of multispectral satellite images. The neural
network is used to classify each image pixel in various land
cove types like vegetations, waterways, man-made structures
and road network. It is per pixel supervised classification using
spectral bands (original feature space). Use of neural network
for classification requires selection of most discriminative
spectral bands and determination of optimal number of nodes
in hidden layer. We propose new methodology based on
multiobjective particle swarm optimization (MOPSO) to
determine discriminative spectral bands and the number of
hidden layer node simultaneously. The result obtained using
such optimized neural network is compared with that of
traditional classifiers like MLC and Euclidean classifier. The
performance of all classifiers is evaluated quantitatively using
Xie-Beni and â indexes. The result shows the superiority of
the proposed method.
A Multiset Rule Based Petri net Algorithm for the Synthesis and Secretary Pat...ijsc
Membrane computing is a branch of Natural computing aiming to abstract computing models from the structure and functioning of the living cell. A comprehensive introduction to membrane computing is meant to offer both computer scientists and non-computer scientists an up-to date overview of the field. In
this paper, we consider a uniform way of treating objects and rules in P Systems with the help of Multiset rewriting rules. Here the synthesis and secretary pathway of glycoprotein in epithelial cells of small intestine is considered as an example. A natural and finite link is explored between Petri nets and membrane Computing. A Petri net (PN) algorithm combined with P Systems is implemented for the synthesis and secretary pathway of Glycoprotein. To capture the compartmentalization of P Systems, the Petri net is extended with localities and to show how to adopt the notion of a Petri net process accordingly.
The algorithm uses symbolic representations of multisets of rules to efficiently generate all the regions associated with the membrane. In essence, this algorithm is built from transport route sharing a set of places modeling the availability of system resources. The algorithm when simulated shows a significant
pathway of safe Petri nets.
MULTI-LEVEL FEATURE FUSION BASED TRANSFER LEARNING FOR PERSON RE-IDENTIFICATIONijaia
Most of the currently known methods treat person re-identification task as classification problem and used commonly neural networks. However, these methods used only high-level convolutional feature or to express the feature representation of pedestrians. Moreover, the current data sets for person reidentification is relatively small. Under the limitation of the number of training set, deep convolutional networks are difficult to train adequately. Therefore, it is very worthwhile to introduce auxiliary data sets to help training. In order to solve this problem, this paper propose a novel method of deep transfer learning, and combines the comparison model with the classification model and multi-level fusion of the convolution features on the basis of transfer learning. In a multi-layers convolutional network, the characteristics of each layer of network are the dimensionality reduction of the previous layer of results, but the information of multi-level features is not only inclusive, but also has certain complementarity. We can using the information gap of different layers of convolutional neural networks to extract a better feature expression. Finally, the algorithm proposed in this paper is fully tested on four data sets (VIPeR, CUHK01, GRID and PRID450S). The obtained re-identification results prove the effectiveness of the algorithm.
Understanding Protein Function on a Genome-scale through the Analysis of Molecular Networks
Cornell Medical School, Physiology, Biophysics and Systems Biology (PBSB) graduate program, 2009.01.26, 16:00-17:00; [I:CORNELL-PBSB] (Long networks talk, incl. the following topics: why networks w. amsci*, funnygene*, net. prediction intro, memint*, tse*, essen*, sandy*, metagenomics*, netpossel*, tyna*+ topnet*, & pubnet* . Fits easily into 60’ w. 10’ questions. PPT works on mac & PC and has many photos w. EXIF tag kwcornellpbsb .)
Date Given: 01/26/2009
Protein structure prediction is the inference of the three-dimensional structure of a protein from its amino acid sequence—that is, the prediction of its folding and its secondary and tertiary structure from its primary structure. Structure prediction is fundamentally different from the inverse problem of protein design. Protein structure prediction is one of the most important goals pursued by bioinformatics and theoretical chemistry; it is highly important in medicine (for example, in drug design) and biotechnology (for example, in the design of novel enzymes).
A multiple sequence alignment (MSA) is a sequence alignment of three or more biological sequences, generally protein, DNA, or RNA. In many cases, the input set of query sequences are assumed to have an evolutionary relationship by which they share a linkage and are descended from a common ancestor. From the resulting MSA, sequence homology can be inferred and phylogenetic analysis can be conducted to assess the sequences' shared evolutionary origins.
Homology modeling, also known as comparative modeling of protein, refers to constructing an atomic-resolution model of the "target" protein from its amino acid sequence and an experimental three-dimensional structure of a related homologous protein (the "template"). Homology modeling relies on the identification of one or more known protein structures likely to resemble the structure of the query sequence, and on the production of an alignment that maps residues in the query sequence to residues in the template sequence has been shown that protein structures are more conserved than protein sequences amongst homologues, but sequences falling below a 20% sequence identity can have very different structure.
Computational Analysis of RNA Nucleotide Sequencesijtsrd
One of the most fascinating and deeply researched fields of all of the biochemical components are the nucleic acids and proteins, especially because of their dynamic structure and function and their fundamental role in the course of evolution. Sequence studies have been carried out and is still being researched on to decode completely the world of genetics and molecular biology. And so, here we present our concept in the form of a simple program that has been developed for analyzing the Amino acid sequence from a given sequence of RNA nucleotide bases, and using the result of which, further, interpretation of the corresponding protein can be done. Shall Juneja | Deepayan Mukherjee | Sachi Garg "Computational Analysis of RNA Nucleotide Sequences" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21342.pdf
Paper URL: https://www.ijtsrd.com/biological-science/bioinformatics/21342/computational-analysis-of-rna-nucleotide-sequences/shall-juneja
Membrane proteins play important roles in various cellular processes, such as cell adhesion, immune response, metabolism and signal transduction. They are popular targets for proteomics research and the common candidates for drug development. Shotgun proteomics methods are available for the identification of membrane proteins.
A New Method for Figuring the Number of Hidden Layer Nodes in BP Algorithmrahulmonikasharma
In the field of artificial neural network, BP neural network is a multi-layer feed-forward neural network. Because it is difficult to figure the number of hidden layer nodes in a BP neural network, the theoretical basis and the existing methods for BP network hidden layer nodes are studied. Then based on traditional empirical formulas, we propose a new approach to rapidly figure the quantity of hidden layer nodes in two-layer network. That is, with the assistance of experience formulas, the horizon of unit number in hidden layer can be confirmed and its optimal value will be found in this horizon. Finally, a new formula for figuring the quantity of hidden layer codes is obtained through fitting input dimension, output dimension and the optimal value of hidden layer codes. Under some given input dimension and output dimension, efficiency and precision of BP algorithm may be improved by applying the proposed formula.
RunPool: A Dynamic Pooling Layer for Convolution Neural NetworkPutra Wanda
Deep learning (DL) has achieved a significant performance in computer vision problems, mainly in automatic feature extraction and representation. However, it is not easy to determine the best pooling method in a different case study. For instance, experts can implement the best types of pooling in image processing cases, which might not be optimal for various tasks. Thus, it is
required to keep in line with the philosophy of DL. In dynamic neural network architecture, it is not practically possible to find
a proper pooling technique for the layers. It is the primary reason why various pooling cannot be applied in the dynamic and multidimensional dataset. To deal with the limitations, it needs to construct an optimal pooling method as a better option than max pooling and average pooling. Therefore, we introduce a dynamic pooling layer called RunPool to train the convolutional
neuralnetwork(CNN)architecture.RunPoolpoolingisproposedtoregularizetheneuralnetworkthatreplacesthedeterministic
pooling functions. In the final section, we test the proposed pooling layer to address classification problems with online social network (OSN) dataset
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized.The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient(MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and
C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...TELKOMNIKA JOURNAL
The flavivirus epidemiology has reached an alarming rate which haunts the world population
including Malaysia. World Health Organization has proposed and practised various methods of vector
control through environmental management, chemical and biological orientations. However, from the listed
control vectors, the most crucial part to be heeded are non-accessible places like water storage and
artificial container. The objective of the study was to acquire and compare various accuracies and crossentropy
errors of the training sets within different learning rates in water storage tank environment which
was essential for detection. This experiment performed transfer learning where Inception-V3 was
implemented. About 534 images were trained to classify between Aedes Aegypti larvae and float valve
within 3 different learning rates. For training accuracy and validation accuracy, learning rates were 0.1;
99.98%, 99.90% and 0.01; 99.91%, 99.77% and 0.001; 99.10%, 99.93%. Cross-entropy errors for training
and validation for 0.1 were 0.0021, 0.0184 whereas for 0.01 were 0.0091, 0.0121 and 0.001; 0.0513,
0.0330. Various accuracies and cross-entropy errors of the training sets within the different learning rates
were successfully acquired and compared.
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...IAEME Publication
This paper presents an approach based on applying an aggregated predictor formed by multiple versions of a multilayer neural network with a back-propagation optimization algorithm for helping the engineer to get a list of the most appropriate well-test interpretation models for a given set of pressure/ production data. The proposed method consists of three stages: (1) data decorrelation through principal component analysis to reduce the covariance between the variables and the dimension of the input layer in the artificial neural network, (2) bootstrap replicates of the learning set where the data is repeatedly sampled with a random split of the data into train sets and using these as new learning sets, and (3) automatic reservoir model identification through aggregated predictor formed by a plurality vote when predicting a new class. This method is described in detail to ensure successful replication of results. The required training and test dataset were generated by using analytical solution models. In our case, there were used 600 samples: 300 for training, 100 for cross-validation, and 200 for testing. Different network structures were tested during this study to arrive at optimum network design. We notice that the single net methodology always brings about confusion in selecting the correct model even though the training results for the constructed networks are close to 1. We notice also that the principal component analysis is an effective strategy in reducing the number of input features, simplifying the network structure, and lowering the training time of the ANN. The results obtained show that the proposed model provides better performance when predicting new data with a coefficient of correlation approximately equal to 95% Compared to a previous approach 80%, the combination of the PCA and ANN is more stable and determine the more accurate results with lesser computational complexity than was feasible previously. Clearly, the aggregated predictor is more stable and shows less bad classes compared to the previous approach.
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...ijtsrd
Convolutional Neural Network CNN designs can successfully classify, predict and cluster in many artificial intelligence applications. In the health sector, intensive studies continue for disease classification. When the literature in this field is examined, it is seen that the studies are concentrated on the health sector. Thanks to these studies, doctors can make an accurate diagnosis by examining radiological images more consistently. In addition, doctors can save time to do other patient work by using CNN. In this study, related current manuscripts in the health sector were examined. The contributions of these publications to the literature were explained and evaluated. Complementary and contradictory arguments of the presented perspectives were revealed. It has been stated that the current status of the studies carried out and in which direction the future studies should evolve and that they can make an important contribution to the literature. Suggestions have been made for the guidance for future studies. Ahmet Özcan | Mahmut Ünver | Atilla Ergüzen "A Survey of Convolutional Neural Network Architectures for Deep Learning via Health Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49156.pdf Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/49156/a-survey-of-convolutional-neural-network-architectures-for-deep-learning-via-health-images/ahmet-özcan
New foreground markers for Drosophila cell segmentation using marker-controll...IJECEIAES
Image segmentation consists of partitioning the image into different objects of interest. For a biological image, the segmentation step is important to understand the biological process. However, it is a challenging task due to the presence of different dimensions for cells, intensity inhomogeneity, and clustered cells. The marker-controlled watershed (MCW) is proposed for segmentation, outperforming the classical watershed. Besides, the choice of markers for this algorithm is important and impacts the results. For this work, two foreground markers are proposed: kernels, constructed with the software Fiji and Obj.MPP markers, constructed with the framework Obj.MPP. The new proposed algorithms are compared to the basic MCW. Furthermore, we prove that Obj.MPP markers are better than kernels. Indeed, the Obj.MPP framework takes into account cell properties such as shape, radiometry, and local contrast. Segmentation results, using new markers and illustrated on real Drosophila dataset, confirm the good performance quality in terms of quantitative and qualitative evaluation.
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...rinzindorjej
In this paper, a fruit image data set is used to compare the efficiency and accuracy of two widely used
Convolutional Neural Network, namely the ResNet and the DenseNet, for the recognition of 50 different
kinds of fruits. In the experiment, the structure of ResNet-34 and DenseNet_BC-121 (with bottleneck layer)
are used. The mathematic principle, experiment detail and the experiment result will be explained through
comparison.
In this paper, a fruit image data set is used to compare the efficiency and accuracy of two widely used Convolutional Neural Network, namely the ResNet and the DenseNet, for the recognition of 50 different kinds of fruits. In the experiment, the structure of ResNet-34 and DenseNet_BC-121 (with bottleneck layer) are used. The mathematic principle, experiment detail and the experiment result will be explained through comparison.
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...rinzindorjej
In this paper, a fruit image data set is used to compare the efficiency and accuracy of two widely used Convolutional Neural Network, namely the ResNet and the DenseNet, for the recognition of 50 different kinds of fruits. In the experiment, the structure of ResNet-34 and DenseNet_BC-121 (with bottleneck layer)
are used. The mathematic principle, experiment detail and the experiment result will be explained through comparison.
We trained a large, deep convolutional neural network to classify the 1.2 million
high-resolution images in the ImageNet LSVRC-2010 contest into the 1000 different
classes. On the test data, we achieved top-1 and top-5 error rates of 37.5%
and 17.0% which is considerably better than the previous state-of-the-art. The
neural network, which has 60 million parameters and 650,000 neurons, consists
of five convolutional layers, some of which are followed by max-pooling layers,
and three fully-connected layers with a final 1000-way softmax. To make training
faster, we used non-saturating neurons and a very efficient GPU implementation
of the convolution operation. To reduce overfitting in the fully-connected
layers we employed a recently-developed regularization method called “dropout”
that proved to be very effective. We also entered a variant of this model in the
ILSVRC-2012 competition and achieved a winning top-5 test error rate of 15.3%,
compared to 26.2% achieved by the second-best entry
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION ijcsit
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals with a
high degree of assurance. Extracting good features is the most significant step in the iris recognition
system. In the past, different features have been used to implement iris recognition system. Most of them are
depend on hand-crafted features designed by biometrics specialists. Due to the success of deep learning in
computer vision problems, the features learned by the Convolutional Neural Network (CNN) have gained
much attention to be applied for iris recognition system. In this paper, we evaluate the extracted learned
features from a pre-trained Convolutional Neural Network (Alex-Net Model) followed by a multi-class
Support Vector Machine (SVM) algorithm to perform classification. The performance of the proposed
system is investigated when extracting features from the segmented iris image and from the normalized iris
image. The proposed iris recognition system is tested on four public datasets IITD, iris databases CASIAIris-V1,
CASIA-Iris-thousand and, CASIA-Iris- V3 Interval. The system achieved excellent results with the
very high accuracy rate.
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals with a high degree of assurance. Extracting good features is the most significant step in the iris recognition system. In the past, different features have been used to implement iris recognition system. Most of them are depend on hand-crafted features designed by biometrics specialists. Due to the success of deep learning in computer vision problems, the features learned by the Convolutional Neural Network (CNN) have gained much attention to be applied for iris recognition system. In this paper, we evaluate the extracted learned features from a pre-trained Convolutional Neural Network (Alex-Net Model) followed by a multi-class Support Vector Machine (SVM) algorithm to perform classification. The performance of the proposed system is investigated when extracting features from the segmented iris image and from the normalized iris image. The proposed iris recognition system is tested on four public datasets IITD, iris databases CASIAIris-V1, CASIA-Iris-thousand and, CASIA-Iris- V3 Interval. The system achieved excellent results with the very high accuracy rate.
Employing Neocognitron Neural Network Base Ensemble Classifiers To Enhance Ef...cscpconf
This paper presents an ensemble of neo-cognitron neural network base classifiers to enhance
the accuracy of the system, along the experimental results. The method offers lesser
computational preprocessing in comparison to other ensemble techniques as it ex-preempts
feature extraction process before feeding the data into base classifiers. This is achieved by the
basic nature of neo-cognitron, it is a multilayer feed-forward neural network. Ensemble of such
base classifiers gives class labels for each pattern that in turn is combined to give the final class
label for that pattern. The purpose of this paper is not only to exemplify learning behaviour of
neo-cognitron as base classifiers, but also to purport better fashion to combine neural network
based ensemble classifiers.
Transfer learning with multiple pre-trained network for fundus classificationTELKOMNIKA JOURNAL
Transfer learning (TL) is a technique of reuse and modify a pre-trained network.
It reuses feature extraction layer at a pre-trained network. A target domain in TL
obtains the features knowledge from the source domain. TL modified
classification layer at a pre-trained network. The target domain can do new tasks
according to a purpose. In this article, the target domain is fundus image
classification includes normal and neovascularization. Data consist of
100 patches. The comparison of training and validation data was 70:30.
The selection of training and validation data is done randomly. Steps of TL i.e
load pre-trained networks, replace final layers, train the network, and assess
network accuracy. First, the pre-trained network is a layer configuration of
the convolutional neural network architecture. Pre-trained network used are
AlexNet, VGG16, VGG19, ResNet50, ResNet101, GoogLeNet, Inception-V3,
InceptionResNetV2, and squeezenet. Second, replace the final layer is to replace
the last three layers. They are fully connected layer, softmax, and output layer.
The layer is replaced with a fully connected layer that classifies according to
number of classes. Furthermore, it's followed by a softmax and output layer that
matches with the target domain. Third, we trained the network. Networks were
trained to produce optimal accuracy. In this section, we use gradient descent
algorithm optimization. Fourth, assess network accuracy. The experiment results
show a testing accuracy between 80% and 100%.
Neural Network Model Development with Soft Computing Techniques for Membrane ...IJECEIAES
Membrane bioreactor employs an efficient filtration technology for solid and liquid separation in wastewater treatment process. Development of membrane filtration model is significant as this model can be used to predict filtration dynamic which is later utilized in control development. Most of the available models only suitable for monitoring purpose, which are too complex, required many variables and not suitable for control system design. This work focusing on the simple time seris model for membrane filtration process using neural network technique. In this paper, submerged membrane filtration model developed using recurrent neural network (RNN) train using genetic algorithm (GA), inertia weight particle swarm optimization (IWPSO) and gravitational search algorithm (GSA). These optimization algorithms are compared in term of its accuracy and convergent speed in updating the weights and biases of the RNN for optimal filtration model. The evaluation of the models is measured using three performance evaluations, which are mean square error (MSE), mean absolute deviation (MAD) and coefficient of determination (R2). From the results obtained, all methods yield satisfactory result for the model, with the best results given by IW-PSO.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
2. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 805 – 813
806
However, the implementation of in silico genome-scale metabolic network in this research which
is using flux balance analysis method consist of huge and unessential components. These
factors may defect in bioprocess production and cell growth. Due to the size, complexity of
metabolic networks and interaction between the components, it is difficult to determine the
optimal gene knockout combination. The development of deep neural network opens up a great
opportunities in solving this problems. Deep neural network able to learn complex pattern from
the lower level to high level of architecture. Thus, representation of data which consist of high
level of abstraction can be learned through complex computational model that consist of
multiple processing layers. Thus, it helps in understanding abstraction and processing of the
cells due to multiple levels of information provided. The biological structure in each layers can
be inferred at multiple levels of resolution [8]. The extraction of bioprocess production in
organisms can be done effectively due to the high level of accuracy of prediction. This can be
done by predicting on several sets of deleted genes that obtain the most bioprocess production
and growth yield. By the end of this study, the most convenience set of gene deletion is highly
selected to extraction high amount of xylitol production.
The rest of this paper depicted as follows. In section 1, discussed on the application of
bioprocess production and the use of metabolic engineering to extract target product. While in
section 2 described the implementation of deep neural network in predicting the bioprocess
product. In section 3 the expected results in the form of graphs are provided and brief
explanation on experimental analysis. In the last section is about conclusion of this work.
2. Research Method
In this section firstly introduced the method which is deep neural network. The main
architecture of deep neural network is presented in this section. Then, the experimental
framework is elaborated for further understanding to generate output from deep neural network.
Deep neural network is used to train the dataset to predict the bioprocess production especially
and the growth rate of escherichia coli.
2.1. Deep Neural Network
Deep neural network is a parallel processing architecture which consists of
interconnection between neurons, organized in a layer form of network. The main structure of
deep neural network are made up of three important components which are input, output and
separated by one or more hidden layers of hidden units. In feedforward structure the network
are working with the presence of input data and directly calculated the output values throughout
every layers of the network. The total input value generated from the layer below, xk are passed
to each of hidden unit, k in the current layer by using logistic function at the scalar state yk. The
interconnection are formed between input layer to the first hidden layer which are then will be
directed to the next hidden layer and so forth until it reached to the output layer. Based on the
interaction shown, it can be as a sort of topological structure.
(1)
Regarding to the formula above denote as bias of unit k. Meanwhile, the value of l is
the index of the unit below and is the weight that connecting unit k from unit l from the layer
below [9]. The implementation of non-linearity into the whole network structure can be done by
defining right architecture and using non-linear activation function. Basically, sigmoidal
activation function is the common choices such as logistic function as shown in the equation
above. The value of the output layer given by the last hidden layer depends on activation
function that attain the supervised task given by the network [10].
(2)
In most of the cases, the classification problem will be solved by using softmax function
as shown in equation 2. Where there is conversion between output unit k to total input xk into
as the probability classes in order to ensure distribution towards m classes. However, identity
function is chosen if the problems are regarding to the regression analysis.
3. TELKOMNIKA ISSN: 1693-6930
Prediction of Bioprocess Production Using Deep Neural Network Method (‘Amirah Baharin)
807
During the learning process, the network is trained by back-propagation algorithm. The
key insight in implementing backpropagation is to compute the gradient of objective function
relative to the weight of multilayer stacking modules. The concept of backpropagation, in every
weight of the input is used to calculate the gradient error. It can be done by straight fully
propagate the error in backward manner. The propagation is started at the top to the bottom
throughout all modules. This can be done by using the cost function to measure the discrepancy
involved between the target and actual output of each training phases.
(3)
Where the cost function C is minimized by given a fixed training set of {(x
(1)
, y
(1)
), … , x
(T)
, y
(T)
), }.
The const function is done by calculating the corss-entropy within softmax output, p and target
probabilities, d. In order to increase the network performance, the weight should be minimize
after the calculation of the cost function takes place. This can be done by calculating the
gradient of the cost function [11]. Afterwards the weights must be appropriately adjusted in
obtaining weight optimization. The optimization is implemented by using mini batch stochastic
gradient descent algorithm.
(4)
Where is the learning rate and the used of momentum coefficient can be further improved the
training method by a declaring 0 < α < 1 for smoothening the gradient of mini-batch, s. The
value of weight must always be in the state of one to implement derivation of biases update rule.
In order to get a clear view, Figure 1 shows the implementation of feedforward and
backpropagation architecture.
Figure 1. Architectural view of deep neural network
2.2. Input Set Preparation and Experimental Framework
In this study, there are three steps involved as shown in figure 2. In order to generate
the input data for deep neural network architecture, firstly a flux balance analysis (FBA) model is
developed. FBA is a constraint-based methods which mathematically presents metabolic
network of organism. It is relevance to genome-scale models as it permits better knowledge on
in vivo system that shows interplay among metabolic pathways. Besides, it is used to validate
wild-type organism of genome-scale metabolic model and metabolite characteristics using any
additional conditions. The essential part of FBA is implementing gene knockout to predict the
resulting phenotypic effects after the deletion takes place [12].The model created based on in
silico metabolic model of genome scale eschericia coli K-12 MG1655 reconstruction. Several
nutritional consumptions are tested by alternating the consumption of glucose, glycerol and
xylose as carbon sources for about 20 mmol/g/dW/h to optimize the production of xylitol and its
growth rate. Furthermore, several sets of gene deletion have been conducted to identify the
effects towards xylitol production and respected growth rate.
4. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 805 – 813
808
In the meantime for the second step, a number of lookup tables is constructed based on
the three sets of gene deletion. The lookup tables are created based on the results of respected
xylitol production and growth rate. There are about 7 column involved where each of it
represents the consumption of glucose, glycerol and xylose alternately. The tables are made
separately between xylitol production and growth rate. Meanwhile, step 3 can be implemented
by inserting the data created based on the lookup table. The output after implementing deep
neural network are calculated in term of mean squared error (MSE). The end results will predict
respected xylitol production and growth rate based on the three set of deleted genes.
Figure 2. Schematics of the procedure used for determining the optimum neural network
(h=hour; mmol=millimolar; g=gram; dW=dry cell weight)
3. Related Works
In this section elaborates about previous works which implementing deep neural
network to improve the prediction of complex pattern in biological information. As deep neural
network shows a huge success as it is implemented in many applications over state-of-the-art
machine learning methods.
3.1. Prediction of Lung Tumors
Based on the study of lung tumours [13], proposed a combination of deep neural
network and fuzzy logic method. The aim of this study is to predict fractional variations including
intra- and inter- sides of several patients which suffer tumour movement related to respiration.
Previously, there are several problems arise where the fractional variations are hardly
mathematized. Furthermore, the movements are hardly predicted as inconstant variation takes
place and taking longer computational time to process the results. Thus, this method allows high
accuracy in predicting the movement and takes lower computational times. The value of root
mean square error (RMSE) is used as a benchmark in the proposed method as it overshoots
with existing methods from 29.98% into 70.93%.
3.2. Compound Protein Interaction Prediction
DL-CPI known as deep learning for compound protein interaction is proposed by Kai et
al., [14] to identify protein and compounds interaction. This study has been conducted due to
several limitations arise in experimental analysis in identifying compound-protein interaction
which are expensive and time-consuming. Deep neural network is used to learn the
representation of compound and protein pairs effectively. The performance of DL-CPI evaluated
by employing multiple measurements which including accuracy, sensitivity, specificity, F1-
measures, area under receiving characteristic curve and area under precision curve. Overall,
DL-CPI boost the performance in both balanced and unbalanced dataset compared to other
methods.
5. TELKOMNIKA ISSN: 1693-6930
Prediction of Bioprocess Production Using Deep Neural Network Method (‘Amirah Baharin)
809
3.3. Enhancer Prediction- Deep Neural Network (EP-DNN)
Based on the study conducted Seong et al., [15] deep neural network has been used in
order to predict the locations of enhancer in gene expression. Basically, short DNA sequence
which is known as enhancer, modulate the patterns generation in gene expression. In order to
predict the location of enhancer, modification of histone combinatorial codes are required.
However, current computational methods suffer from lack interpretation of obtainable results in
order to choose biological significant modification of histone and low prediction accuracy. The
implementation of EP-DNN improved the enhancer prediction accuracy by having more than
90% validation rates in identifying operational region. Furthermore, this study uncovers the
variation of essential modification of histone between different cells and identify either the
proximal or distal features are important.
4. Results and Analysis
The performance of the three dataset has been tested in order to predict the optimal
results for the respected xylitol production and growth rate in escherichia coli model. The
number of learning rates has been adjusted in order to get the lowest value of RMSE in order to
choose the most accurate result on the deleted genes. To compare the performance of the
model, several graphs have been generated respected to fine-tuning values of learning rates
and epochs.
4.1. In Silico Genome-Scale Metabolic Model Analysis
The escherichia coli model iJO1366 in system biology markup file is imported into FBA
to get the respected growth rate and xylitol production of the organisms. Furthermore, gene
deletion has been implemented to predict the effect towards the production of the target
metabolites. The main structure of the model made up of stoichiometric coefficient with
complete sets of biochemical reactions between substrates and products. Constraints value is
then be applied to predict the flux distribution of mutant strain that undergo gene knockout
creating a smaller feasible solution space. M9 minimal media has been used in this study and
alternate used of glucose, glycerol and xylose as carbon source uptake.Table 1 shows the
consumption of the constraints between glucose, glycerol and xylose in the metabolic model
correspondingly. Optimal flux distribution will be identified within the new solution space.
Table 1. Conditional probabilities for the uptake rate of glucose, glycerol and xylose
Conditions Glucose (mmol
gDW-1hr-1)
Glycerol (mmol
gDW-1hr-1)
Xylose(mmol
gDW-1hr-1)
1 20 - -
2 - 20 -
3 - - 20
4 20 20 -
5 20 - 20
6 - 20 20
7 20 20 20
After the constraint value has been added in the model, the value of objective function
is initialised for targeting the optimal solutions. However, in this study, focusing on maximizing
the growth rate to ensure the survival of the organism and increasing the xylitol production at
the same time. Gene deletions will takes place after the initialisation of objective function and
respected costraints has been added into the model. Figure 2 shows the graph based on the
results of the analysis with whcich comprised of three sets of deleted genes model. There are
involving the deletion of i) rpi genes, ii) pgi, eno, mgsa genes and iii) rpi, pgi, eno and mgsa
genes. (The notation of the genese: rpi: ribose-5-phosphate isomerase, eno: enolase, mgsA:
methylglyoxal synthase and pgi: phosphoglucose-isomorase). Figure 3 shows the sectional part
of metabolic pathways which involved in xylitol production and respected genes to be deleted
from eschericia coli model.
6. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 805 – 813
810
Figure 3. Metabolic pathway for the deletion of of i) rpi genes, ii) pgi, eno, mgsa genes and
iii) rpi, pgi, eno and mgsa genes for xylitol production
Based on the results shown in Figure 4, there are three sets of gene deletion from the
model. The resultant values showing ribose-5-phosphate isomerase (rpi) gives higher
production of xylitol and growth rate by average of 54.07237 and 24.51196 respectively.
Meanwhile the second sets of deletion involving the deletion of pgi, eno and mgsA genes gives
lower value of xylitol production by mean of 47.27046 while the average growth rate is 9.9921.
However, in the last sets involving combination of the other two sets of gene deletions shows
lowest results with the average of 34.58231 and 9.970653 of respected xylitol production and its
growth rate. Besides, it can be seen that almost 60% of the cell growth has been used up to
maximize xylitol production in the model which is quite high for the deletion between pgi, eno,
mgsA and rpi, pgi, eno and mgsA genes.
Figure 4. Xylitol production (mmol gDW
-1
hr
-1
) and growth rate (hr
-1
) of the three deleted
genes model in escherichia coli
The deleted genes which include pgi eno and mgsA are contributed in the glycolysis
pathway. The pgi genes converting the glucose-6-phosphate into fructose-6-phosphate. This
reaction situated in between glycolysis and pentose-phosphate pathway. While eno is
responsible in catalysing reversible reaction in glycolysis metabolism. It contributes in the
dehydration of of 2-phophoglycerate into phosphoenolpyruvate. The mgsA gene is required in
the conversion of dehydroxyacetate phosphate into methylglyoxal. The deletion of pgi will
increase in production of NADPH. Thus, the NADPH are then being reoxidized via reduction of
xylose. While, the deletion of mgsA will cause the glucose consumption is decreases compared
to the wild type. Furthermore, this deletion resulting accumulation of glucose-6-phosphate.
Whereas, the deletion rpi cause of expression of xylitol phosphate dehydrogenase (xpdh) result
in the increase of xylitol production. Surprisingly, every consumption of the constraints are able
to produce xylitol either in individual conditions or grouping. This is strongly summarised that
xylitol can be produced in either in glucose, glycerol and xylitol consumptions in all sets of
deleted gene.
7. TELKOMNIKA ISSN: 1693-6930
Prediction of Bioprocess Production Using Deep Neural Network Method (‘Amirah Baharin)
811
4.2. Evaluating the Training Error
The deep neural network are trained using the dataset based on the results generated
from the in silico metabolic model analysis. There are 6 three types of dataset which have been
used in this study that including the xylitol production and respected growth rate for each type of
deleted genes. The experimental simulation has been implemented based on different number
of learning rates according to the range of 0.1-0.9 and 0.01-0.09. The choice which has been
made was purely done on the arbitrary basis. These simulations have been implemented in
order to compare the performance based on the three models involved. However, the most
optimal learning rates are chosen to examine which set of gene deletion that gives the highest
value especially for xylitol production and also the cell growth.
Figure 5. MSE of deleted genes in i) rpi, ii) pgi,eno,mgsA and iii) all genes for the learning rate
0.01 at epochs 350
In the first experimental result as shown in figure 5 the training of deep neural network
involved the learning rate 0.01. The result at this point can be considered as one of the best
value for MSE compared to the other learning rate between 0.01 until 0.09. The deletion of rpi
shows the lowest value of MSE for xylitol production wich is 1.498066 compared to the other
training models. However, the highest value of MSE for the deletion of pgi, eno and mgsA
genes which is 1.991501. The difference of MSE between the deletion of rpi and pgi, eno, mgsA
is 0.493435. Meanwhile, the value of MSE for the growth rate is higher as compared to the
production of xylitol. The deletion of all genes shows the lowest value for MSE which is
1.529821.Whereas the highest MSE for growth rate takes place when the pgi, eno and mgsA
genes are deleted from eschericia coli model. Based on this situation, rpi is considered the most
potential gene to be deleted in order to increase the value of xylitol production. This is due to the
lowest error obtained from the trainng involved in deep neural network. Regarding to the result
shown in previous section, where the simulation of flux balance analysis has been
implemented.It can be seen that xylitol production for rpi deletion is at 54.07237 mmol gDW
-1
hr
-1
which is the highest value compared to the other gene deletion models. Furthermore, the value
of growth rate can be considered as optimal result which is at 24.512 hr
-1
. Even though there is
slight difference of prediction during the training process in deep neural network for the growth
rate, however eschericia coli model are still can survived in order to extract xylitol production.
Figure 6. MSE of deleted genes in i) rpi, ii) pgi,eno,mgsA and iii) all genes for the learning rate
0.1 at epochs 350
8. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 805 – 813
812
The second experimental analysis, the performance of the gene deletion models has
been assessed by training the deep neural network architecture with learning rate 0.1 until 0.9.
However, only the best MSE result has been presented in this paper. Based on figure 6, at the
learning rate 0.1 can be considered as the best results of MSE. The deletion of pgi, eno, mgsA
genes model shows the best results in terms of MSE due to the lowest value of error for xylitol
production which is 1.937199 compared to the other models. In contrast, all gene deletion
models obtained the highest MSE which is 2.91628. The difference between the lowest and the
highest value of MSE for these two models took about 0.979081. On the other hand, the
prediction of MSE for growth rate is slightly different compared to the results obtained for xylitol
production. This is due to the all gene deletion model obtained the lowest value of MSE
compared which is 1.350655. The highest MSE is at the deletion of pgi, eno, mgsA genes
where the MSE is 2.03373. The difference of the error is quite higher which is 0.72718. The
prediction which has been calculated in this second experimental analysis is completely
different based on the results obtained from flux balance analysis simulation. However, the rpi
gene deletion model can be considered as the optimal results since it does not obtained the
highest error value for both situations.
These two experimental analyses perform different behavior in terms of error prediction
due to the different lowest value of MSE with respected to the gene deletion models. Generally,
in the first experimental analysis, the lowest MSE prediction involved in the deletion of rpi which
is 1.498066 for xylitol production. In contrast, for the second experimental analysis obtained
about 1.937199 error prediction for the production of xylitol when pgi, eno, mgsA genes are
deleted from escherichia coli model. However, in terms of the growth rate based on these two
models rpi still shows the most optimal value of MSE compared to the pgi, eno, and mgsA gene
deletion model into its respective cases. Based on the experimental simulation, it can be found
that small learning rates produced better and consistent results in predicting xylitol production
and growth rate. In contrast, large learning rate produced inconsistent results.
5. Conclusion
The modeling and simulation of genome scale metabolic models have effectively played
an important role in aiding the metabolic engineering, especially for improvement of bioprocess
production. The use of in silico genome-scale metabolic model analysis allows the identification
of identify the essential genes that able to form a minimal genome without degrading the
biological function. In terms of biological validation, the in silico results obtained show the
conflict between the metabolites production and the growth rate of the microorganism where
higher production can be obtained with a lower growth rate and vice-versa. Using the capability
of deep neural network, it has been successfully identified the optimal gene knockout strategy to
improve the production of desired bioprocess production for such xylitol production. The result
presented in this research predict the most optimal value for xylitol production and respected
growth rate. It has been noted that for many deep neural network examined the lowest xylitol
production errors occurred at the lowest learning rate. For these cases, learning rate 0.01 has
been chosen as the best learning rate in order to obtain the optimal solutions. The best
performance for the gene deletion model is rpi since the value of error is at the lowest point for
the production of xylitol and low error in terms of growth rate. It is quite interesting to note that
for all learning rate which has been tested performs the best in terms of prediction analysis at
350 epochs.
Acknowledgements
This project was supported by Malaysian Ministry of Higher Education (MOHE),
managed by Universiti Teknologi Malaysia Research Management Centre (RMC) under
Fundamental Research Grant Scheme (FRGS) vote number R.J130000.7828.4F481.
References
[1] Povelainen M, Miasnikov AN. Production of xylitol by metabolically engineered strains of Bacillus
subtilis. Journal of biotechnology. 2007; 128(1): 24-31.
9. TELKOMNIKA ISSN: 1693-6930
Prediction of Bioprocess Production Using Deep Neural Network Method (‘Amirah Baharin)
813
[2] Cirino PC, Chin JW, Ingram LO. Engineering Escherichia coli for xylitol production from
glucose‐xylose mixtures. Biotechnology and bioengineering. 2006; 95(6): 1167-76.
[3] Emodi A. Xylitol: its properties and food applications. Food Technology. 1978.
[4] Pepper T. Xylitol in sugar-free confections. Food Technol. 1988; 10: 98-106.
[5] Kim JH, Han KC, Koh YH, Ryu YW, Seo JH. Optimization of fed-batch fermentation for xylitol
production by Candida tropicalis. Journal of Industrial Microbiology and Biotechnology. 2002; 29(1):
16-9.
[6] Khankal R, Chin JW, Cirino PC. Role of xylose transporters in xylitol production from engineered
Escherichia coli. Journal of biotechnology. 2008; 134(3): 246-52.
[7] Price ND, Papin JA, Schilling CH, Palsson BO. Genome-scale microbial in silico models: the
constraints-based approach. Trends in biotechnology. 2003; 21(4): 162-9.
[8] Kotsiantis SB. Supervised Machine Learning: A Review of Classification Techniques. Informatica.
2007; 31: 249-68
[9] Hinton G, Deng L, Yu D, Dahl GE, Mohamed AR, Jaitly N, Senior A, Vanhoucke V, Nguyen P,
Sainath TN, Kingsbury B. Deep neural networks for acoustic modeling in speech recognition: The
shared views of four research groups. IEEE Signal Processing Magazine. 2012; 29(6): 82-97.
[10] Larochelle H, Bengio Y, Louradour J, Lamblin P. Exploring strategies for training deep neural
networks. Journal of Machine Learning Research. 2009; 10(Jan): 1-40.
[11] Qian Y, Fan Y, Hu W, Soong FK. On the training aspects of deep neural network (DNN) for
parametric TTS synthesis. In2014 IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP). 2014; 4: 3829-3833.
[12] Antoniewicz MR, Kraynie DF, Laffend LA, González-Lergier J, Kelleher JK, Stephanopoulos G.
Metabolic flux analysis in a nonstationary system: fed-batch fermentation of a high yielding strain of
E. coli producing 1, 3-propanediol. Metabolic engineering. 2007; 9(3): 277-92.
[13] Park S, Lee SJ, Weiss E, Motai Y. Intra-and Inter-Fractional Variation Prediction of Lung Tumors
Using Fuzzy Deep Learning. IEEE journal of translational engineering in health and medicine. 2016;
4: 1-2.
[14] Tian K, Shao M, Zhou S, Guan J. Boosting compound-protein interaction prediction by deep learning.
In Bioinformatics and Biomedicine (BIBM), 2015 IEEE International Conference on. 2015: 29-34.
[15] Kim SG, Theera-Ampornpunt N, Grama A, Chaterji S. Interpretable deep neural networks for
enhancer prediction. InBioinformatics and Biomedicine (BIBM). IEEE International Conference on
2015; 9: 242-249.