Results (11)
Search Parameters:
Keyword: VariantsIdentification of Genetic Variants for Prioritized miRNA-targeted Genes Associated with Complex Traits
Genome-wide association studies, or GWAS, have reported associations between SNPs and specific diseases/traits. GWAS results contain variants located in different genomic regions, including variants in the 3’UTR. MicroRNAs, or miRNAs, are small noncoding RNAs that bind to the 3’UTRs of genes to regulate gene expression. However, variant(s) that are located in the 3’UTR could impact…
Read MoreDistribution Management Problem: Heuristic Solution for Vehicle Routing Problem with Time Windows (VRPTW) in the Moroccan Petroleum Sector
The attributes of the vehicle routing problem (VRP) are as many additional characteristics or constraints which aim to better take into account the specificities of real application cs. The variants of the VRP thus formed are the support of an extremely rich literature, comprising an immense variety of heuristics. This article constitutes an industrial application…
Read MoreTowards a Model-based and Variant-oriented Development of a System of Systems
The development of an aggregated system consisting of autonomously developed components is usually implemented as a self-contained unit. If such an aggregation is understood as a system of systems (SoS) that communicates via interfaces with its autonomous subsystems and components, the interfaces and communication exchange should play a central role in the architectural design. In…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MorePower Converters and EMS for Fuel Cells CCHP Applications: A Structural and Extended Review
Fuel Cells (FCs) and Combined Cooling, Heating and Power (CCHP) systems are becoming very popular due to their environmental friendliness and immense applications. This extended review paper commenced by introducing the rampant South Africa’s electricity crisis as the basis for the study, followed by some structural analyses of up to forty-four miscellaneous power electronics converters…
Read MoreTechnological Stages of Schwartz Cylinder’s Computer and Mathematics Design using Intelligent System Support
In this paper, one of the “problem zones” in mathematics concerned with the surface area of three-dimensional bodies is presented by computer and mathematical modeling with synergetic effects using intelligent system support. The problems of personal self-organization and technological stages of student’s research activity in the process of modern achievements in science adaptation in teaching…
Read MoreDesign and Optimization of a Three Stage Electromechanical Power Unit using Numerical Methods
The advent of electric vehicles has changed the face of the automobile industry. The drive system properties of vehicles such as eBikes or electric cars differ fundamentally from those of a diesel engine. The lack of a conventional internal combustion engine has made the vehicles considerably silent. Nevertheless, previously hidden sources of vibration and noise…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreEstimation of Target Maneuvers from Tracked Behavior Using Fuzzy Evidence Accrual
While the Kalman filter, including its many variants, has been the staple of the tracking community, it also has been shown to have drawbacks, particularly when tracking through a maneuver. The most common issue is a lag in the position of the target track compared to the true target position as the target performs its…
Read MoreOn Modeling Affect in Audio with Non-Linear Symbolic Dynamics
The discovery of semantic information from complex signals is a task concerned with connecting humans’ perceptions and/or intentions with the signals content. In the case of audio signals, complex perceptions are appraised in a listener’s mind, that trigger affective responses that may be relevant for well-being and survival. In this paper we are interested in…
Read More
