Results 91 to 100 of about 43,053,907 (426)

Managing trust in a peer-2-peer information system

open access: yesInternational Conference on Information and Knowledge Management, 2001
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are based on reputation, focus on the semantic properties of the trust model ...
K. Aberer, Zoran Despotovic
semanticscholar   +1 more source

Flow‐based immunomagnetic enrichment of circulating tumor cells from diagnostic leukapheresis product

open access: yesMolecular Oncology, EarlyView.
The number of circulating tumor cells obtained from prostate cancer patients was increased approximately 5‐fold compared to regular CellSearch when processing 2 mL diagnostic leukapheresis material aliquots and increased by 44‐fold when processing 20 mL DLA aliquots using the flow enrichment target capture Halbach‐array.
Michiel Stevens   +8 more
wiley   +1 more source

Compression of dynamic fuzzy relation information systems [PDF]

open access: yesarXiv, 2012
This paper further investigates the data compression of fuzzy relation information systems. First, we introduce an algorithm for constructing the homomorphism between fuzzy relation information systems. Then, we discuss that how to compress the dynamic fuzzy relation information systems by utilizing the compression of the original systems.
arxiv  

Characterizing information loss in a chaotic double pendulum with the Information Bottleneck [PDF]

open access: yesarXiv, 2022
A hallmark of chaotic dynamics is the loss of information with time. Although information loss is often expressed through a connection to Lyapunov exponents -- valid in the limit of high information about the system state -- this picture misses the rich spectrum of information decay across different levels of granularity.
arxiv  

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

Sentiment analysis of reviews related to Unesco Global Geopark (UGG) Ciletuh Palabuhanratu on google maps using the naive bayes algorithm [PDF]

open access: yesBIO Web of Conferences
Ciletuh Geopark is part of the UNESCO Global Geopark Network. This study will analyze a tourist review of the Ciletuh Pelabuhan Ratu Geopark based on reviews on Google Maps.
Erfina Adhitia   +2 more
doaj   +1 more source

Analysis of Information Theoretic Limitation for Linear Time Invariant Feedback Systems [PDF]

open access: yesarXiv, 2015
Information-theoretic fundamental limitation in feedback control system is an important topic for decades. In this paper, a new bode-like fundamental inequality in causal feedback control system is developed. This inequality relates directed information, mutual information and bode sensitivity functions.
arxiv  

Parkside 0428; Building-Structure Inventory Form [PDF]

open access: yes, 1984
https://digitalcommons.buffalostate.edu/parkside_district_parkside/1076/thumbnail ...
NYS Cultural Resource Information System (CRIS)
core   +1 more source

Identification of functional and diverse circulating cancer‐associated fibroblasts in metastatic castration‐naïve prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink   +6 more
wiley   +1 more source

Identity Authentication Using Portable Electroencephalography Signals in Resting States

open access: yesIEEE Access, 2019
Biometric identity authentication technology is widely used in the field of information security. As a new biological method, electroencephalography (EEG) is gradually applied in biometric recognition, because scientists believe that practicability and ...
Rongkai Zhang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy