Results 21 to 30 of about 154,933 (276)

Influence of batch effect correction methods on drug induced differential gene expression profiles

open access: yesBMC Bioinformatics, 2019
Background Batch effects were not accounted for in most of the studies of computational drug repositioning based on gene expression signatures. It is unknown how batch effect removal methods impact the results of signature-based drug repositioning ...
Wei Zhou   +2 more
doaj   +1 more source

Duo: A Signature Based Method to Batch-Analyze Functional Similarities of Proteins

open access: yesFrontiers in Microbiology, 2021
With the rapid advancement of sequencing technology, handling of large sequencing data to analyze for protein coding capacity and functionality of predicted proteins has become an urgent demand.
Xiao Fei   +10 more
doaj   +1 more source

Applying Prolog to Develop Distributed Systems [PDF]

open access: yes, 2010
Development of distributed systems is a difficult task. Declarative programming techniques hold a promising potential for effectively supporting programmer in this challenge.
ANDREY RYBALCHENKO   +17 more
core   +3 more sources

Practical classification of different moving targets using automotive radar and deep neural networks [PDF]

open access: yes, 2018
In this work, the authors present results for classification of different classes of targets (car, single and multiple people, bicycle) using automotive radar data and different neural networks.
Angelov, Aleksandar   +3 more
core   +1 more source

Improvement in RSA Cryptosystem

open access: yesJournal of Advances in Information Technology, 2011
Boneh and Shacham gave a nice survey on four variants (Batch RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA). Rebalanced RSA and MultiPower RSA were then combined to increase the decryption/signature generation performance.
Seema Verma, Deepak Garg
doaj   +1 more source

Model based fault diagnosis for hybrid systems : application on chemical processes [PDF]

open access: yes, 2009
The complexity and the size of the industrial chemical processes induce the monitoring of a growing number of process variables. Their knowledge is generally based on the measurements of system variables and on the physico-chemical models of the process.
Hétreux, Gilles   +3 more
core   +2 more sources

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

Multi-TGDR: a regularization method for multi-class classification in microarray experiments [PDF]

open access: yes, 2013
Background With microarray technology becoming mature and popular, the selection and use of a small number of relevant genes for accurate classification of samples is a hot topic in the circles of biostatistics and bioinformatics.
Suárez-Fariñas, Mayte, Tian, Suyan
core   +3 more sources

Interest-Based Access Control for Content Centric Networks (extended version)

open access: yes, 2015
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar   +3 more
core   +1 more source

Identification of cancer risk assessment signature in patients with chronic obstructive pulmonary disease and exploration of the potential key genes

open access: yesAnnals of Medicine, 2022
It is essential to assess the cancer risk for patients with chronic obstructive pulmonary disease (COPD). Comparing gene expression data from patients with lung cancer (a total of 506 samples) and those with cancer-adjacent normal lung tissues (a total ...
Qingzhou Guan   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy