Pub Date : 2024-05-07DOI: 10.37934/araset.44.2.110
Siti Hajar Mohd Khairuddin, Muhammad Azrin Ahmad, Mohd Sham Mohamad
The study of splicing systems and their language has grown rapidly since Paun developed a splicing system known as a regular splicing scheme that produces a regular language. Since then, the researchers have been eager to classify the splicing language into certain classes in the Chomsky hierarchy, such as context-free language, context-sensitive language and recursive enumerable language. Previously, the study on the n-th order limit language was conducted from the biological perspective to the limit language produced. Still, no research has been done from the generation of language point of view. This research presents a generalization on the type of classes of the formal language, the n-th order limit language. The cases to obtain the n-th order limit language are revisited and used to obtain the types of language classes according to the Chomsky hierarchy produced by the n-th order limit language.
自从保恩提出了一种能产生规则语言的拼接系统(称为规则拼接方案)以来,对拼接系统及其语言的研究迅速发展。此后,研究人员一直渴望将拼接语言划分为乔姆斯基等级体系中的某些类别,如无语境语言、语境敏感语言和递归可数语言。在此之前,关于 n 阶极限语言的研究都是从生物学角度对产生的极限语言进行的。但是,还没有人从语言生成的角度进行过研究。本研究提出了对形式语言--n-阶极限语言--类别类型的概括。本研究重新审视了获得 n 阶极限语言的案例,并根据 n 阶极限语言产生的乔姆斯基层次结构来获得语言类别的类型。
{"title":"Classification of n-th Order Limit Language in Formal Language Classes","authors":"Siti Hajar Mohd Khairuddin, Muhammad Azrin Ahmad, Mohd Sham Mohamad","doi":"10.37934/araset.44.2.110","DOIUrl":"https://doi.org/10.37934/araset.44.2.110","url":null,"abstract":"The study of splicing systems and their language has grown rapidly since Paun developed a splicing system known as a regular splicing scheme that produces a regular language. Since then, the researchers have been eager to classify the splicing language into certain classes in the Chomsky hierarchy, such as context-free language, context-sensitive language and recursive enumerable language. Previously, the study on the n-th order limit language was conducted from the biological perspective to the limit language produced. Still, no research has been done from the generation of language point of view. This research presents a generalization on the type of classes of the formal language, the n-th order limit language. The cases to obtain the n-th order limit language are revisited and used to obtain the types of language classes according to the Chomsky hierarchy produced by the n-th order limit language.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":"87 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141004012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.37934/araset.44.2.175183
Teguh Puja Negara, Sudradjat Supian, Subiyanto, Mohd Kamarulzaki Mustafa
The optical response of the photonic crystal structure has been analyzed using the Finite Difference Frequency Domain (FDFD) method. Simulation using this method aims to analyze the characteristics of light transmission when interacting with related structure. The results of the study of photonic crystal structures with two defects show that there are two transmittance bands called double resonances at two specific wavelengths. Changes in the resonance peak with respect to the variations of refractive index in the second defect layer resulted in a linear change with significant sensitivity. For photonic crystals with two defects, the first defect is a metal layer and the second defect is material sensing, which produces double resonance with a sensitivity of 7,825 and 3,2675, while for photonic crystals with the first defect, a dielectric layer, and the second defect is material sensing, produces single resonance with a sensitivity of 2,022. The choice of the first defect is that the metal layer is quite important, in addition to producing greater sensitivity, it also produces a field enhancement between the dielectric and the metal layer which is called surface plasmon resonance (SPR). The sensitivity value can also be set by determining the thickness of the second defect layer. These results can be used as a standard for fabrication and developed for sensor applications.
{"title":"Double Resonance Characteristic of Photonic Crystal Structure with Defect Metal Layer","authors":"Teguh Puja Negara, Sudradjat Supian, Subiyanto, Mohd Kamarulzaki Mustafa","doi":"10.37934/araset.44.2.175183","DOIUrl":"https://doi.org/10.37934/araset.44.2.175183","url":null,"abstract":"The optical response of the photonic crystal structure has been analyzed using the Finite Difference Frequency Domain (FDFD) method. Simulation using this method aims to analyze the characteristics of light transmission when interacting with related structure. The results of the study of photonic crystal structures with two defects show that there are two transmittance bands called double resonances at two specific wavelengths. Changes in the resonance peak with respect to the variations of refractive index in the second defect layer resulted in a linear change with significant sensitivity. For photonic crystals with two defects, the first defect is a metal layer and the second defect is material sensing, which produces double resonance with a sensitivity of 7,825 and 3,2675, while for photonic crystals with the first defect, a dielectric layer, and the second defect is material sensing, produces single resonance with a sensitivity of 2,022. The choice of the first defect is that the metal layer is quite important, in addition to producing greater sensitivity, it also produces a field enhancement between the dielectric and the metal layer which is called surface plasmon resonance (SPR). The sensitivity value can also be set by determining the thickness of the second defect layer. These results can be used as a standard for fabrication and developed for sensor applications.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":"70 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141003906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.37934/araset.44.2.247259
Marwa Ahmed Hassan, Noha Hany El-Amary, Amany Khaled
With the dramatic increase of energy demand around the world, it has become a necessity to monitor and optimize energy consumption to conserve its use and decrease carbon emissions. This paper presents a comprehensive analysis of MicroGrids (MGs) that encompass a diverse array of energy sources, including renewable energy, Diesel Generators (DGs), and Battery Storage Systems (BSS). In this study, critical constraints are addressed such as distributed generator limits and grid power exchange. Moreover, the potential integration of nanomaterials within BSS to enhance energy efficiency and achieve Negawatt energy are explored. The main objectives are to evaluate the performance of various energy system configurations, with a specific focus on nanomaterial-enhanced batteries, and identify the optimal strategy to minimize operating costs while maximizing Negawatt energy production. By considering technical, economic, and environmental factors, this research aims to provide valuable insights into sustainable and efficient Microgrid solutions for future energy management.
{"title":"Negawatt-Driven Sustainable Energy Management Based-on Nanomaterial-Enhanced Batteries","authors":"Marwa Ahmed Hassan, Noha Hany El-Amary, Amany Khaled","doi":"10.37934/araset.44.2.247259","DOIUrl":"https://doi.org/10.37934/araset.44.2.247259","url":null,"abstract":"With the dramatic increase of energy demand around the world, it has become a necessity to monitor and optimize energy consumption to conserve its use and decrease carbon emissions. This paper presents a comprehensive analysis of MicroGrids (MGs) that encompass a diverse array of energy sources, including renewable energy, Diesel Generators (DGs), and Battery Storage Systems (BSS). In this study, critical constraints are addressed such as distributed generator limits and grid power exchange. Moreover, the potential integration of nanomaterials within BSS to enhance energy efficiency and achieve Negawatt energy are explored. The main objectives are to evaluate the performance of various energy system configurations, with a specific focus on nanomaterial-enhanced batteries, and identify the optimal strategy to minimize operating costs while maximizing Negawatt energy production. By considering technical, economic, and environmental factors, this research aims to provide valuable insights into sustainable and efficient Microgrid solutions for future energy management.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":"33 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141003766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.37934/araset.44.2.135174
Nur Syahirah Zulkipli, Siti Zanariah Satari, Wan Nur Syahidah Wan Yusoff
Craniosynostosis syndrome is a congenital condition occurring due to the abnormal development of the skull, leading to abnormalities in skull morphology. Apert syndrome is one of common craniosynostosis syndrome in Malaysia and this syndrome can be categorized as the severe craniofacial disorders. The abnormalities of skull morphological in Apert syndrome patient can be identified as outliers which are investigated in this study. This study presents a skull morphological analysis based on a case study involving six paediatric patients diagnosed with Apert syndrome, alongside 22 control patients aged 0 to 12 years, all of whom underwent treatment at the University Malaya Medical Centre (UMMC). The computerized tomography scan (CTSCAN) data is provided by UMMC recorded from year 2012 until 2020 and the data is measured using MIMICS software by taking the measurement of cranial angles. The clustering-based procedures will be applied to identify the abnormalities in skull angle dataset. There are 12 skull angles and these angles are analysed using hierarchical clustering algorithms for identifying the outliers or abnormalities. The objective is to detect the abnormalities and determine the skull angles that associated with Apert syndrome (AS) in Malaysia population using clustering-based procedure. The abnormalities in Apert syndrome datasets are successfully detected by the algorithms and this study found that there are skull angles with specific location of angles are associated with Apert syndrome. This study also found that the location of skull angles for patients age 0-24 months old and >24 months old are different. The findings of this study can assist the surgical team in directing additional focus towards specific regions of the skull during the planning of interventions. This guidance has the potential to optimize surgical outcomes and reduce the risk of potential complications.
{"title":"Abnormalities Detection in Apert Syndrome using Hierarchical Clustering Algorithms","authors":"Nur Syahirah Zulkipli, Siti Zanariah Satari, Wan Nur Syahidah Wan Yusoff","doi":"10.37934/araset.44.2.135174","DOIUrl":"https://doi.org/10.37934/araset.44.2.135174","url":null,"abstract":"Craniosynostosis syndrome is a congenital condition occurring due to the abnormal development of the skull, leading to abnormalities in skull morphology. Apert syndrome is one of common craniosynostosis syndrome in Malaysia and this syndrome can be categorized as the severe craniofacial disorders. The abnormalities of skull morphological in Apert syndrome patient can be identified as outliers which are investigated in this study. This study presents a skull morphological analysis based on a case study involving six paediatric patients diagnosed with Apert syndrome, alongside 22 control patients aged 0 to 12 years, all of whom underwent treatment at the University Malaya Medical Centre (UMMC). The computerized tomography scan (CTSCAN) data is provided by UMMC recorded from year 2012 until 2020 and the data is measured using MIMICS software by taking the measurement of cranial angles. The clustering-based procedures will be applied to identify the abnormalities in skull angle dataset. There are 12 skull angles and these angles are analysed using hierarchical clustering algorithms for identifying the outliers or abnormalities. The objective is to detect the abnormalities and determine the skull angles that associated with Apert syndrome (AS) in Malaysia population using clustering-based procedure. The abnormalities in Apert syndrome datasets are successfully detected by the algorithms and this study found that there are skull angles with specific location of angles are associated with Apert syndrome. This study also found that the location of skull angles for patients age 0-24 months old and >24 months old are different. The findings of this study can assist the surgical team in directing additional focus towards specific regions of the skull during the planning of interventions. This guidance has the potential to optimize surgical outcomes and reduce the risk of potential complications.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141004261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.37934/araset.44.2.234246
Nahla Elazab Elashkar, Mahmoud Maghraby
The algorithms for processing images and videos are currently essential for many applications. Many of these applications are specified for processing and analyzing images of numbers, such as smart meter reading, automated document processing, and processing of vehicles and license plate images in traffic monitoring and analysis. Consequently, eliminating noise is frequently used as a pre-processing step to improve subsequent analysis and processing outcomes. In this context, this manuscript proposes using artificial intelligence-based methods to increase the efficiency of the image-denoising process. However, the computational demands of these algorithms necessitate careful consideration of the hardware on which they are implemented. Therefore, this paper proposes using the simple autoencoder approach and evaluates its efficiency compared to the conventional methods. This unsupervised model is trained to identify and remove impulse noise from digital images by replacing some pixels with others from the outer dataset that can clarify the whole image more. The model was trained using handwritten numbers, MNIST, and data set size in the first trial and the FER2013 dataset in the second. The model is superior in the case of the simple dataset. Two versions of autoencoders are considered, the first with three layers and the second with five. The Traditional denoising methods are investigated for comparison purposes. The four conventional filtering procedures, AMF, DBMF, ADBMF, and MDBUTMF, are implemented using the MATLAB simulation environment, and the results are reported and compared with the proposed methodology. The results show that the proposed artificial intelligence-based method significantly outperforms the traditional methods regarding processing efficiency and the resulting image quality. Moreover, the computational intensity for the proposed methodology is chosen as a metric for evaluating the algorithm compliance for the hardware implementation compared to the other Artificial Intelligence (AI)-based denoising algorithms. The suggested technique has minor processing and training time compared to the other AI-based methods with adequate quality in case the images of numbers usually do not contain many details, making it more convenient for hardware implementation.
{"title":"Autoencoder-based Image Denoiser Suitable for Image of Numbers with High Potential for Hardware Implementation","authors":"Nahla Elazab Elashkar, Mahmoud Maghraby","doi":"10.37934/araset.44.2.234246","DOIUrl":"https://doi.org/10.37934/araset.44.2.234246","url":null,"abstract":"The algorithms for processing images and videos are currently essential for many applications. Many of these applications are specified for processing and analyzing images of numbers, such as smart meter reading, automated document processing, and processing of vehicles and license plate images in traffic monitoring and analysis. Consequently, eliminating noise is frequently used as a pre-processing step to improve subsequent analysis and processing outcomes. In this context, this manuscript proposes using artificial intelligence-based methods to increase the efficiency of the image-denoising process. However, the computational demands of these algorithms necessitate careful consideration of the hardware on which they are implemented. Therefore, this paper proposes using the simple autoencoder approach and evaluates its efficiency compared to the conventional methods. This unsupervised model is trained to identify and remove impulse noise from digital images by replacing some pixels with others from the outer dataset that can clarify the whole image more. The model was trained using handwritten numbers, MNIST, and data set size in the first trial and the FER2013 dataset in the second. The model is superior in the case of the simple dataset. Two versions of autoencoders are considered, the first with three layers and the second with five. The Traditional denoising methods are investigated for comparison purposes. The four conventional filtering procedures, AMF, DBMF, ADBMF, and MDBUTMF, are implemented using the MATLAB simulation environment, and the results are reported and compared with the proposed methodology. The results show that the proposed artificial intelligence-based method significantly outperforms the traditional methods regarding processing efficiency and the resulting image quality. Moreover, the computational intensity for the proposed methodology is chosen as a metric for evaluating the algorithm compliance for the hardware implementation compared to the other Artificial Intelligence (AI)-based denoising algorithms. The suggested technique has minor processing and training time compared to the other AI-based methods with adequate quality in case the images of numbers usually do not contain many details, making it more convenient for hardware implementation.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":"6 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141004485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.37934/araset.44.2.124134
Syazwani Zainal Abidin, Nor Izzati Zainal Abidin, Hanita Daud
The Vehicle Routing Problem (VRP) involves a set of customers with known locations, each having a certain demand for goods or services. There is also a fleet of vehicles available, each with limited capacity and often a fixed starting point. With the aid of mathematical programming tools, this paper offers an overview of the most recent VRP research. This study also examines the algorithms for solving VRP models and categorizes them in terms of their application areas. For these reasons, related publications that appeared in the international journal have been compiled and studied. According to the literature review, multi-criteria decision-making (MCDM) techniques have yet to constitute the most mathematical programming methods used to solve the VRP problem.
{"title":"Decision-Making Support in Vehicle Routing Problems: A Review of Recent Literature","authors":"Syazwani Zainal Abidin, Nor Izzati Zainal Abidin, Hanita Daud","doi":"10.37934/araset.44.2.124134","DOIUrl":"https://doi.org/10.37934/araset.44.2.124134","url":null,"abstract":"The Vehicle Routing Problem (VRP) involves a set of customers with known locations, each having a certain demand for goods or services. There is also a fleet of vehicles available, each with limited capacity and often a fixed starting point. With the aid of mathematical programming tools, this paper offers an overview of the most recent VRP research. This study also examines the algorithms for solving VRP models and categorizes them in terms of their application areas. For these reasons, related publications that appeared in the international journal have been compiled and studied. According to the literature review, multi-criteria decision-making (MCDM) techniques have yet to constitute the most mathematical programming methods used to solve the VRP problem.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141002740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.37934/araset.44.2.184198
Muhamad Syakir Kamis, Muhamad Faiz Abd Latif, Mimi Faisyalini Ramli, Reventheran Ganasan, Mohd Asran Shamsuddin, Mohd Eizzuddin Mahyeddin, Nadia Amena Iskandar
The Gemas – Johor Bahru Electrified Double Track Project (GJBEDTP) is the most recent railway electrification. GJBEDTP runs from Gemas Railway Station to Johore Bahru (JB) Sentral. Since the JB Sentral station platform track is existing, it cannot achieve the minimal offset in the client's Statement of Needs (SON). The station canopy's acting load capacity is limited, so it cannot support the Overhead Line Equipment (OLE). Malaysia's standard offset value was 3.0 m, while the KTMB guideline's maximum offset value is 3.60 m and the minimum is 2.60 m. Thus, this research investigates the concrete mast offset that should be used when track separation is lower than standard. JB Sentral architecture data was collected to evaluate the mast offset. Sicat Master simulation and a cross-sectional diagram can be used to determine the proper minimum offset from the data collected. The results show that the mast at the centre of the two tracks can achieve clearances with the minimum offset of 1.80 m from the track centreline to the concrete mast face. These results also show that tangent track alignment allows a minimum offset of 1.80 m at a lower train speed.
{"title":"Determination of OCS Mast Offset in Johore Bahru Sentral for Gemas-Johor Electrified Double Track Project","authors":"Muhamad Syakir Kamis, Muhamad Faiz Abd Latif, Mimi Faisyalini Ramli, Reventheran Ganasan, Mohd Asran Shamsuddin, Mohd Eizzuddin Mahyeddin, Nadia Amena Iskandar","doi":"10.37934/araset.44.2.184198","DOIUrl":"https://doi.org/10.37934/araset.44.2.184198","url":null,"abstract":"The Gemas – Johor Bahru Electrified Double Track Project (GJBEDTP) is the most recent railway electrification. GJBEDTP runs from Gemas Railway Station to Johore Bahru (JB) Sentral. Since the JB Sentral station platform track is existing, it cannot achieve the minimal offset in the client's Statement of Needs (SON). The station canopy's acting load capacity is limited, so it cannot support the Overhead Line Equipment (OLE). Malaysia's standard offset value was 3.0 m, while the KTMB guideline's maximum offset value is 3.60 m and the minimum is 2.60 m. Thus, this research investigates the concrete mast offset that should be used when track separation is lower than standard. JB Sentral architecture data was collected to evaluate the mast offset. Sicat Master simulation and a cross-sectional diagram can be used to determine the proper minimum offset from the data collected. The results show that the mast at the centre of the two tracks can achieve clearances with the minimum offset of 1.80 m from the track centreline to the concrete mast face. These results also show that tangent track alignment allows a minimum offset of 1.80 m at a lower train speed.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141002679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-17DOI: 10.37934/araset.43.2.178188
Fazleen Haslinda, Fazlia Natasha Abdul Aziz, Shafiq-ur-Rehman, Ahmad Azani Othman
Drug metabolism in the human liver initiated by Cytochrome P450 (CYP450) has been widely acknowledged. They oxidise drugs, harmful compounds, and endogenous molecules like steroids. In our research study, we mainly focused on CYP3A4 of the CYP450 subfamily that is widely available in the liver around 15% - 20% of hepatic content and plays a significant function in metabolising up to 50% of drugs in the market today. However, the CYP3A4 gene encodes CYP3A4 enzymes that are highly polymorphic, which could affect enzymatic activity and cause variable responses in drug metabolism. Clustered Regularly Interspaced Short Palindromic Repeats Associated Protein 9 also known as the CRISPR-Cas9 system is a gene editing method that allows scientists to edit parts of the genome by insertions and deletions. Hence, this method would be useful for genetic variants such as the CYP3A4 gene. The objectives of this study are to design a guide RNA (gRNA), to insert the designed gRNA into pGuide-it-Zs-Green1 vector, to quantify the purified CYP3A4-KO plasmid vector by using NanoDrop® and to transfect the constructed vector in a hepatic cell line. The methodology involved the selection of the gRNA by using the online gene editing tool, Synthego (https://design.synthego.com), annealing oligos of the gRNA for CYP3A4, cloning gRNA into a plasmid vector, isolation, and purification of the CYP3A4-KO plasmid vector. The construction of the CRISPR-Cas9 targeting vector in this study was successfully achieved and promising since the selected gRNA for CYP3A4 gene which is 5’-ATAAATCCCACTGGACCAAA-3’ and located in exon 5 was correctly ligated after the confirmed with sequencing reaction and cloned it into a plasmid vector. The yield of pCYP3A4-KO plasmid DNA was a good candidate for transfection.
{"title":"The Construction of CRISPR-Cas9 System Targeting Vector for CYP3A4 Gene in Hepatic Cell Lines","authors":"Fazleen Haslinda, Fazlia Natasha Abdul Aziz, Shafiq-ur-Rehman, Ahmad Azani Othman","doi":"10.37934/araset.43.2.178188","DOIUrl":"https://doi.org/10.37934/araset.43.2.178188","url":null,"abstract":"Drug metabolism in the human liver initiated by Cytochrome P450 (CYP450) has been widely acknowledged. They oxidise drugs, harmful compounds, and endogenous molecules like steroids. In our research study, we mainly focused on CYP3A4 of the CYP450 subfamily that is widely available in the liver around 15% - 20% of hepatic content and plays a significant function in metabolising up to 50% of drugs in the market today. However, the CYP3A4 gene encodes CYP3A4 enzymes that are highly polymorphic, which could affect enzymatic activity and cause variable responses in drug metabolism. Clustered Regularly Interspaced Short Palindromic Repeats Associated Protein 9 also known as the CRISPR-Cas9 system is a gene editing method that allows scientists to edit parts of the genome by insertions and deletions. Hence, this method would be useful for genetic variants such as the CYP3A4 gene. The objectives of this study are to design a guide RNA (gRNA), to insert the designed gRNA into pGuide-it-Zs-Green1 vector, to quantify the purified CYP3A4-KO plasmid vector by using NanoDrop® and to transfect the constructed vector in a hepatic cell line. The methodology involved the selection of the gRNA by using the online gene editing tool, Synthego (https://design.synthego.com), annealing oligos of the gRNA for CYP3A4, cloning gRNA into a plasmid vector, isolation, and purification of the CYP3A4-KO plasmid vector. The construction of the CRISPR-Cas9 targeting vector in this study was successfully achieved and promising since the selected gRNA for CYP3A4 gene which is 5’-ATAAATCCCACTGGACCAAA-3’ and located in exon 5 was correctly ligated after the confirmed with sequencing reaction and cloned it into a plasmid vector. The yield of pCYP3A4-KO plasmid DNA was a good candidate for transfection.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140693324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-17DOI: 10.37934/araset.43.2.7592
Mohammad Jawad Kadhim Abood, Ghassan Hameed Abdul-Majeed
Distributed Denial of Service (DDoS) attacks, which adversely impact network availability, confidentiality, and integrity, represent a persistent threat. These attacks involve affected systems consuming resources through spurious requests instead of serving legitimate clients. Various methodologies exist for detecting and mitigating DDoS attacks, with Machine Learning (ML) emerging as a particularly effective approach due to its predictive capabilities after training on pertinent data. The primary objective of this study is to identify an improved ML algorithm for the detection of multiple DDoS types, considering metrics such as accuracy, precision, recall, and training time. Leveraging WEKA tools and the CICDDoS2019 dataset, several machine-learning algorithms, including Multilayer Perceptron, Reduced Error Pruning (REP) Tree, Partial Decision Tree (PART), RandomForest, and J48, were trained and evaluated. Among these, J48 was determined to be the superior algorithm for classifying four DDoS types (UDP, SYN, Portmap, MSSQL), based on the aforementioned criteria. The algorithms were experimented with using diverse sets of features, and optimal results were obtained using six features, resulting in an overall accuracy of 99.97%. Subsequently, the selected algorithm was integrated into a real-time model, exhibiting exceptional performance, which will be thoroughly elucidated and discussed in a forthcoming paper.
{"title":"Enhancing Multi-Class DDoS Attack Classification using Machine Learning Techniques","authors":"Mohammad Jawad Kadhim Abood, Ghassan Hameed Abdul-Majeed","doi":"10.37934/araset.43.2.7592","DOIUrl":"https://doi.org/10.37934/araset.43.2.7592","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks, which adversely impact network availability, confidentiality, and integrity, represent a persistent threat. These attacks involve affected systems consuming resources through spurious requests instead of serving legitimate clients. Various methodologies exist for detecting and mitigating DDoS attacks, with Machine Learning (ML) emerging as a particularly effective approach due to its predictive capabilities after training on pertinent data. The primary objective of this study is to identify an improved ML algorithm for the detection of multiple DDoS types, considering metrics such as accuracy, precision, recall, and training time. Leveraging WEKA tools and the CICDDoS2019 dataset, several machine-learning algorithms, including Multilayer Perceptron, Reduced Error Pruning (REP) Tree, Partial Decision Tree (PART), RandomForest, and J48, were trained and evaluated. Among these, J48 was determined to be the superior algorithm for classifying four DDoS types (UDP, SYN, Portmap, MSSQL), based on the aforementioned criteria. The algorithms were experimented with using diverse sets of features, and optimal results were obtained using six features, resulting in an overall accuracy of 99.97%. Subsequently, the selected algorithm was integrated into a real-time model, exhibiting exceptional performance, which will be thoroughly elucidated and discussed in a forthcoming paper.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":" 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140691092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-17DOI: 10.37934/araset.43.2.220236
Lee Yee Lin, Khoo Terh Jing, Chow Yan Thung, Ha Chin Yee
E-tendering implementation can bring significant benefits such as cost savings, transparency in contract and maximize the efficiency and resources to the construction industry. E-tendering also allows users to participate through internet where this increases the competition, lower down transaction cost and minimize the time consumption and errors in the bidding processes. This study determines the readiness level of E-tendering to the Malaysian construction industry so that the construction industries are capable to overcome the possible issues and enhance their implementation of E-tendering in Malaysia. The research applied mixed methodology. 89 respondents have participated in the questionnaire while five respondents were interviewed in the interview sessions. The results showed that E-tendering organization’s attitudinal readiness has several factors such as foresee the construction tendering practice trends, aware if the introduction of E-tendering is by the government, interested in E-tendering, foresee the increasingly importance of E-tendering to company and good knowledge of IT. The organization’s physical readiness has factors such as software facilities, network access, investment in IT, computer infrastructure and technical staff. The results can be used by policies makers to promote the adoption of E-tendering among the potential practitioners in Malaysia where this can improve the efficiency in construction projects tendering process.
{"title":"The Readiness of the Malaysian Construction Industry for E-tendering After COVID-19 Pandemic","authors":"Lee Yee Lin, Khoo Terh Jing, Chow Yan Thung, Ha Chin Yee","doi":"10.37934/araset.43.2.220236","DOIUrl":"https://doi.org/10.37934/araset.43.2.220236","url":null,"abstract":"E-tendering implementation can bring significant benefits such as cost savings, transparency in contract and maximize the efficiency and resources to the construction industry. E-tendering also allows users to participate through internet where this increases the competition, lower down transaction cost and minimize the time consumption and errors in the bidding processes. This study determines the readiness level of E-tendering to the Malaysian construction industry so that the construction industries are capable to overcome the possible issues and enhance their implementation of E-tendering in Malaysia. The research applied mixed methodology. 89 respondents have participated in the questionnaire while five respondents were interviewed in the interview sessions. The results showed that E-tendering organization’s attitudinal readiness has several factors such as foresee the construction tendering practice trends, aware if the introduction of E-tendering is by the government, interested in E-tendering, foresee the increasingly importance of E-tendering to company and good knowledge of IT. The organization’s physical readiness has factors such as software facilities, network access, investment in IT, computer infrastructure and technical staff. The results can be used by policies makers to promote the adoption of E-tendering among the potential practitioners in Malaysia where this can improve the efficiency in construction projects tendering process.","PeriodicalId":506443,"journal":{"name":"Journal of Advanced Research in Applied Sciences and Engineering Technology","volume":" 32","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140691244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}