A Novel Optimized Approach for Gene Identification in DNA Sequences
Gene identification is an open optimization problem in Bioinformatics. Exponential growth of biological data needs efficient methods for protein translation. Several approaches have been proposed that rely on indicator sequences, statistical and DSP techniques but yet an optimized procedure is requi...
| Main Authors: | Ahmad, Muneer, Azween, Abdullah, Buragga, Khalid |
|---|---|
| Format: | Citation Index Journal |
| Language: | English English |
| Published: |
Science Aleret
2011
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/3156/ http://scholars.utp.edu.my/id/eprint/3156/1/IC-22776-JAS-ANSI%20.pdf http://scholars.utp.edu.my/id/eprint/3156/2/22776-22776.pdf |
Similar Items
A Better Way for Exon Identification in DNA Splicing
by: Ahmad, Muneer, et al.
Published: (2010)
by: Ahmad, Muneer, et al.
Published: (2010)
Genetic algorithms for gene ontology - based protein sequence annotation
by: Othman, Muhamad Razib
Published: (2007)
by: Othman, Muhamad Razib
Published: (2007)
WeiFu: A novel pan-cancer driver gene identification method using incidence-weighted mutation scores
by: Ren, Yanjie, et al.
Published: (2024)
by: Ren, Yanjie, et al.
Published: (2024)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Operation sequencing using modified particle swarm optimization
by: Zakaria, Zalmiyah, et al.
Published: (2007)
by: Zakaria, Zalmiyah, et al.
Published: (2007)
Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique
by: I. , Ahmad, et al.
Published: (2010)
by: I. , Ahmad, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Developing an emergent theoretical framework for artificial pseudo-gene communication pathway in DNA computing
by: Shamsudin, Ahmad Faizul, et al.
Published: (2012)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2012)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Experimental implementation of direct-proportional length-based dna computing for numerical optimization of the shortest path problem
by: Ibrahim, Zuwairie, et al.
Published: (2007)
by: Ibrahim, Zuwairie, et al.
Published: (2007)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Hybrid concentration-controlled direct-proportional length-based DNA computing for numerical optimization of the shortest path problem
by: Ibrahim, Zuwairie, et al.
Published: (2006)
by: Ibrahim, Zuwairie, et al.
Published: (2006)
Diagnosing the viability of functional analysis of a gene sequence process in multiple-recursive bioinformatics experimentalwork situations
by: Ibrahim, Roliana
Published: (2008)
by: Ibrahim, Roliana
Published: (2008)
A Soft Computing Approach for the Memory Storage of a Sound Signal Processor
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2010)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2010)
Process Sequencing Modeled as TSP with Precedence Constraints - A Genetic Algorithm Approach
by: N. M., Razali
Published: (2014)
by: N. M., Razali
Published: (2014)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
An approach of bio-inspired generalized shape for writer identification
by: Muda , Azah Kamilah, et al.
Published: (2006)
by: Muda , Azah Kamilah, et al.
Published: (2006)
Selecting informative genes from leukemia gene expression data using a hybrid approach for cancer classification
by: Mohamad, Mohd. Saberi, et al.
Published: (2007)
by: Mohamad, Mohd. Saberi, et al.
Published: (2007)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Survivability Using Adaptive Reconfigurable Systems
by: Azween, Abdullah
Published: (2009)
by: Azween, Abdullah
Published: (2009)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Block based semi-global alignment scheme for the analysis of Given DNA sequences
by: Basu, K., et al.
Published: (2006)
by: Basu, K., et al.
Published: (2006)
SOMEA: self-organizing map based extraction algorithm for DNA motif identification with heterogeneous model
by: Lee, Nung Kion, et al.
Published: (2011)
by: Lee, Nung Kion, et al.
Published: (2011)
A Novel Soft Set Approach in Selecting Clustering Attribute
by: Qin, Hongwu, et al.
Published: (2012)
by: Qin, Hongwu, et al.
Published: (2012)
A novel fuzzy approach to evaluate the quality of examination timetabling
by: Asmuni, Hishammuddin, et al.
Published: (2007)
by: Asmuni, Hishammuddin, et al.
Published: (2007)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Optimization of MISCORE-based Motif Identification Systems
by: Lee, Nung Kion, et al.
Published: (2009)
by: Lee, Nung Kion, et al.
Published: (2009)
A Novel Method for Fuzzy Measure Identification
by: Larbani, Moussa, et al.
Published: (2011)
by: Larbani, Moussa, et al.
Published: (2011)
Direct-proportional length-based DNA computing implementation for elevator scheduling problem
by: Muhammad, Mohd. Saufee, et al.
Published: (2007)
by: Muhammad, Mohd. Saufee, et al.
Published: (2007)
A Novel Approach to Explore Edhi Foundation Knowledge for Ontology Construction
by: Raza, Muhammad Ahsan, et al.
Published: (2020)
by: Raza, Muhammad Ahsan, et al.
Published: (2020)
Analysis of sequence batch reactor for COD and TSS removal identification from septic sludge treatment plant using bio inspired algorithm: a case study in Sarawak
by: Sie Chun, Ting, et al.
Published: (2012)
by: Sie Chun, Ting, et al.
Published: (2012)
Incorporating semantic similarity measure in genetic algorithm: an approach for searching the gene ontology terms
by: M. Othman, Razib, et al.
Published: (2007)
by: M. Othman, Razib, et al.
Published: (2007)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Similar Items
-
A Better Way for Exon Identification in DNA Splicing
by: Ahmad, Muneer, et al.
Published: (2010) -
Genetic algorithms for gene ontology - based protein sequence annotation
by: Othman, Muhamad Razib
Published: (2007) -
WeiFu: A novel pan-cancer driver gene identification method using incidence-weighted mutation scores
by: Ren, Yanjie, et al.
Published: (2024) -
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010) -
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)