Results 21 to 30 of about 154,933 (276)
Influence of batch effect correction methods on drug induced differential gene expression profiles
Background Batch effects were not accounted for in most of the studies of computational drug repositioning based on gene expression signatures. It is unknown how batch effect removal methods impact the results of signature-based drug repositioning ...
Wei Zhou +2 more
doaj +1 more source
Duo: A Signature Based Method to Batch-Analyze Functional Similarities of Proteins
With the rapid advancement of sequencing technology, handling of large sequencing data to analyze for protein coding capacity and functionality of predicted proteins has become an urgent demand.
Xiao Fei +10 more
doaj +1 more source
Applying Prolog to Develop Distributed Systems [PDF]
Development of distributed systems is a difficult task. Declarative programming techniques hold a promising potential for effectively supporting programmer in this challenge.
ANDREY RYBALCHENKO +17 more
core +3 more sources
Practical classification of different moving targets using automotive radar and deep neural networks [PDF]
In this work, the authors present results for classification of different classes of targets (car, single and multiple people, bicycle) using automotive radar data and different neural networks.
Angelov, Aleksandar +3 more
core +1 more source
Improvement in RSA Cryptosystem
Boneh and Shacham gave a nice survey on four variants (Batch RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA). Rebalanced RSA and MultiPower RSA were then combined to increase the decryption/signature generation performance.
Seema Verma, Deepak Garg
doaj +1 more source
Model based fault diagnosis for hybrid systems : application on chemical processes [PDF]
The complexity and the size of the industrial chemical processes induce the monitoring of a growing number of process variables. Their knowledge is generally based on the measurements of system variables and on the physico-chemical models of the process.
Hétreux, Gilles +3 more
core +2 more sources
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
Multi-TGDR: a regularization method for multi-class classification in microarray experiments [PDF]
Background With microarray technology becoming mature and popular, the selection and use of a small number of relevant genes for accurate classification of samples is a hot topic in the circles of biostatistics and bioinformatics.
Suárez-Fariñas, Mayte, Tian, Suyan
core +3 more sources
Interest-Based Access Control for Content Centric Networks (extended version)
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar +3 more
core +1 more source
It is essential to assess the cancer risk for patients with chronic obstructive pulmonary disease (COPD). Comparing gene expression data from patients with lung cancer (a total of 506 samples) and those with cancer-adjacent normal lung tissues (a total ...
Qingzhou Guan +5 more
doaj +1 more source

