2018
DOI: 10.14569/ijacsa.2018.090543
|View full text |Cite
|
Sign up to set email alerts
|

Motif Detection in Cellular Tumor p53 Antigen Protein Sequences by using Bioinformatics Big Data Analytical Techniques

Abstract: Abstract-Due to the rapid growth of data in the field of big data and bioinformatics, the analysis and management of the data is a very difficult task for the scientist and the researchers. Data exists in many formats like in the form of groups and clusters. The data that exist in the group form and have some repetition patterns called Motifs. A lot of tools and techniques are available in the literature to detect the motifs in different fields like neural networks, antigen/antibody protein, metabolic pathways… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
1
1
0
Order By: Relevance
“…In the Kalman filter derivation formula, joins an Adaptive Predictor Filter (APF) and Discrete Wavelet Transformation (DWT) to identify pure noise. Moreover, our other approaches like [ 50 , 51 , 52 , 53 ] also support our words.…”
Section: Methodology and Deliverablessupporting
confidence: 84%
“…In the Kalman filter derivation formula, joins an Adaptive Predictor Filter (APF) and Discrete Wavelet Transformation (DWT) to identify pure noise. Moreover, our other approaches like [ 50 , 51 , 52 , 53 ] also support our words.…”
Section: Methodology and Deliverablessupporting
confidence: 84%
“…The unification of WBANs and cloud-computing as a sensor cloud infrastructure (SC-I) supports the healthcare environment by real-time patient tracking, and early disease detection [26]. However, this lacks standard architecture, policy compliance, typical data collection, patient behavior management, medically coded passwords, data sharing, data disclosure, data management, and multiple data organization [27]. Likewise, the SC-I needs to pay particular attention to friendly applications, network security, real-time implementation, access control, and better-quality patient data access [28].…”
Section: Background and Related Workmentioning
confidence: 99%