A Fully Automated Method for Noisy cDNA Microarray Image Quantification
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 11, Issue 3
Abstract
DNA microarray is an innovative tool for gene studies in biomedical research, and its applications can vary from cancer diagnosis to human identification. Image processing is an important aspect of microarray experiments, the primary purpose of the image analysis step is to extract numerical foreground and background intensities for the red and green channels for each spot on the microarray. The background intensities are used to correct the foreground intensities for local variation on the array surface, resulting in corrected red and green intensities for each spot that can be considered as a primary data for subsequent analysis. Most techniques divide the overall microarray image processing into three steps: gridding, segmentation, and quantification. In this paper, a  simple automated gridding technique is developed with a great effect on noisy microarray images. A segmentation technique based on ‘edge-detection’ is applied to identify the spots and separate the foreground from the background is known as microarray image segmentation. Finally, a quantification technique is used to calculate the gene expression level from the intensity values of the red and green components of the image. Results revealed that the developed methods can deal with various kinds of noisy microarray images, with high  griddingaccuracy of 92.2% for low quality images and 100% for high quality images resulting in better spot quantification to get more accurate gene expression values.Â
Authors and Affiliations
Islam A. Fouad, Mai S. Mabrouk, Amr A. Sharawy
A CLUSTER ANALYSIS AND DECISION TREE HYBRID APPROACH IN DATA MINING TO DESCRIBING TAX AUDIT
In this research, we use clustering and classification methods to mine the data of tax and extract the information about tax audit by using hybrid algorithms K-MEANS, SOM and HAC algorithms from clustering and CHAID and...
Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and...
AN EFFECTIVE USAGE PARAMETER CONTROL MODEL FOR CELL POLICING IN ATM NETWORKS
The primary role of traffic control procedures is to protect the network so that it can achieve the required network performance objectives and yield a high quality of service (QoS). To guarantee the QoS, the network imp...
Implementation of packet scheduling algorithms in LTE-Sim
In this research paper we have implemented downlink packet scheduling algorithms in LTE-Sim simulation for LTE cellular networks. The implementation includes adding two packet scheduling algorithms (Round Robin and MaxRa...
Incremental Frequent Pattern Mining using Graph based approach
Extracting useful information from huge amount of data is known as Data Mining. It happens at the intersection of artificial intelligence and statistics. It is also defined as the use of computer algorithms to discover h...