Current Search: Kotlarchyk, Alex J. (x)
View All Items
- Title
- Identification of MicroRNA biomarkers for cancer by combining multiple feature selection techniques.
- Creator
- Kotlarchyk, Alex J., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
MicroRNAs (miRNAs) may serve as diagnostic and predictive biomarkers for cancer. The aim of this study was to identify novel cancer biomarkers from miRNA datasets, in addition to those already known. Three published miRNA cancer datasets (liver, breast, and brain) were evaluated, and the performance of the entire feature set was compared to the performance of individual feature filters, an ensemble of those filters, and a support vector machine (SVM) wrapper. In addition to confirming many...
Show moreMicroRNAs (miRNAs) may serve as diagnostic and predictive biomarkers for cancer. The aim of this study was to identify novel cancer biomarkers from miRNA datasets, in addition to those already known. Three published miRNA cancer datasets (liver, breast, and brain) were evaluated, and the performance of the entire feature set was compared to the performance of individual feature filters, an ensemble of those filters, and a support vector machine (SVM) wrapper. In addition to confirming many known biomarkers, the main contribution of this study is that seven miRNAs have been newly identified by our ensemble methodology as possible important biomarkers for hepatocellular carcinoma or breast cancer, pending wet lab confirmation. These biomarkers were identified from miRNA expression datasets by combining multiple feature selection techniques (i.e., creating an ensemble) or by the SVM-wrapper, and then classified by different learners. Generally speaking, creating a subset of features by selecting only the highest ranking features (miRNAs) improved upon results generated when using all the miRNAs, and the ensemble and SVM-wrapper approaches outperformed individual feature selection methods. Finally, an algorithm to determine the number of top-ranked features to include in the creation of feature subsets was developed. This algorithm takes into account the performance improvement gained by adding additional features compared to the cost of adding those features.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3332260
- Subject Headings
- Gene silencing, Biochemical markers, Cancer, Diagnosis, Data processing, Cancer, Diagnosis, Research, Gene expression, Tumor markers, Diagnostic use
- Format
- Document (PDF)
- Title
- Fuzzy vault fingerprint cryptography: Experimental and simulation studies.
- Creator
- Kotlarchyk, Alex J., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The fuzzy vault scheme introduced by Juels and Sudan [Jue02] was implemented in a fingerprint cryptography system using COTS software. This system proved to be unsuccessful. Failure analysis led to a series of simulations to investigate the parameters and system thresholds necessary for such a system to perform adequately and as guidance for constructing similar systems in the future. First, a discussion of the role of biometrics in data security and cryptography is presented, followed by a...
Show moreThe fuzzy vault scheme introduced by Juels and Sudan [Jue02] was implemented in a fingerprint cryptography system using COTS software. This system proved to be unsuccessful. Failure analysis led to a series of simulations to investigate the parameters and system thresholds necessary for such a system to perform adequately and as guidance for constructing similar systems in the future. First, a discussion of the role of biometrics in data security and cryptography is presented, followed by a review of the key developments leading to the development of the fuzzy vault scheme. The relevant mathematics and algorithms are briefly explained. This is followed by a detailed description of the implementation and simulation of the fuzzy vault scheme. Finally, conclusions drawn from analysis of the results of this research are presented.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13360
- Subject Headings
- Computer networks--Security measures, Computer security, Data encryption (Computer science)
- Format
- Document (PDF)