Results 41 to 50 of about 21,934,771 (354)
A comprehensive evaluation of module detection methods for gene expression data
Modules composed of groups of genes with similar expression profiles tend to be functionally related and co-regulated. Here, Saelens et al evaluate the performance of 42 computational methods and provide practical guidelines for module detection in gene ...
Wouter Saelens+2 more
doaj +1 more source
Partial Selfish Mining for More Profits [PDF]
Mining attacks aim to gain an unfair share of extra rewards in the blockchain mining. Selfish mining can preserve discovered blocks and strategically release them, wasting honest miners' computing resources and getting higher profits. Previous mining attacks either conceal the mined whole blocks (hiding or discarding), or release them completely in a ...
arxiv
Mental stress can lead to traffic accidents by reducing a driver’s concentration or increasing fatigue while driving. In recent years, demand for methods to detect drivers’ stress in advance to prevent dangerous situations increased.
Jaewon Lee, Hyeonjeong Lee, Miyoung Shin
doaj +1 more source
Web + Data Mining = Web Mining [PDF]
Dieser Beitrag gibt eine kurze Beschreibung, was unter dem Begriff Web Mining zu verstehen ist und wie Webdaten mit gangigen Data-Mining-Techniken kombiniert werden konnen, um das Web besser als Informationsquelle nutzbar zu machen. Des Weiteren wird ein Uberblick uber die gangigen Hauptachsen gegeben, entlang derer die meisten aktuellen Entwicklungen ...
openaire +2 more sources
Radiogenomic-based prediction of genetic alterations in oncogenic signaling pathways in lung cancer
Rationale and objectives Lung adenocarcinoma, a type of non-small cell lung cancer (NSCLC), originates from the peripheral lung tissue and is the most prevalent histologic subtype, constituting around 40% of cases.
Priyadharshini Jayachandran+2 more
doaj +1 more source
Incremental Road Network Update Method with Trajectory Data and UAV Remote Sensing Imagery
GPS trajectory and remote sensing data are crucial for updating urban road networks because they contain critical spatial and temporal information.
Jianxin Qin+4 more
doaj +1 more source
Molecular and functional profiling unravels targetable vulnerabilities in colorectal cancer
We used whole exome and RNA‐sequencing to profile divergent genomic and transcriptomic landscapes of microsatellite stable (MSS) and microsatellite instable (MSI) colorectal cancer. Alterations were classified using a computational score for integrative cancer variant annotation and prioritization.
Efstathios‐Iason Vlachavas+15 more
wiley +1 more source
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong+3 more
doaj +1 more source
Spatiotemporal Data Mining: A Survey [PDF]
Spatiotemporal data mining aims to discover interesting, useful but non-trivial patterns in big spatial and spatiotemporal data. They are used in various application domains such as public safety, ecology, epidemiology, earth science, etc. This problem is challenging because of the high societal cost of spurious patterns and exorbitant computational ...
arxiv
TGF‐β has a complex role in cancer, exhibiting both tumor‐suppressive and tumor‐promoting properties. Using a series of differentiated tumoroids, derived from different stages and mutational background of colorectal cancer patients, we replicate this duality of TGF‐β in vitro. Notably, the atypical but highly aggressive KRASQ22K mutation rendered early‐
Theresia Mair+17 more
wiley +1 more source