abracadabra 发表于 2025-3-25 04:40:45

Controlled Hypotension in Neuroanaesthesiaised clustering has received a great deal of interest, most methods rely on basic statistical or machine learning methods. In this paper we discuss a method based on the paraclique algorithm, and demonstrate its potential effectiveness through testing on four sets of publicly available gene expression microarray data.

nostrum 发表于 2025-3-25 08:27:10

http://reply.papertrans.cn/27/2635/263484/263484_22.png

违反 发表于 2025-3-25 14:36:26

http://reply.papertrans.cn/27/2635/263484/263484_23.png

兵团 发表于 2025-3-25 16:44:34

978-3-030-27683-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl

Melanocytes 发表于 2025-3-25 20:40:33

Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/263484.jpg

无底 发表于 2025-3-26 04:05:03

Smart Persistence and Accessibility of Genomic and Clinical Datand make them easily accessible through the development of a collection of Application Programming Interfaces (APIs), in order to provide a flexible framework that we called OpenOmics. To prove the validity of our approach, we apply it on data extracted from The Genomic Data Commons repository. OpenO

explicit 发表于 2025-3-26 05:50:15

Classification of Pre-cursor microRNAs from Different Species Using a New Set of Featuresnce) is possible with a combination of distance and regular k-mer features..The novel features specifically aid classification at closer evolutionary distances when compared to k-mers only. K-mer and k-mer distance features together lead to accurate classification for larger evolutionary distances s

Ganglion-Cyst 发表于 2025-3-26 11:11:28

Theoretical and Practical Analyses in Metagenomic Sequence Classificationmation derived from the known genomes and eventually used in the learning and classification processes may create several experimental issues—mostly based on the amount of information used in the processes and its uniqueness, significance, and redundancy,—and some of these issues are intrinsic both

尖叫 发表于 2025-3-26 16:41:32

Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Sec analyses can be used as springboards to a set of principles to help enunciate the assumptions and system-level security requirements useful as the bases for systems’ security validation and verification.

卜闻 发表于 2025-3-26 18:23:32

Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight Simulatorthen mitigate the severity of the identified risks from level 4 to level 2 as per the IEC 61508 standard. The cryptosystem used for risk mitigation performed relatively faster as compared to some of the most recently proposed encryption schemes.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Database and Expert Systems Applications; DEXA 2019 Internatio Gabriele Anderst-Kotsis,A Min Tjoa,Michael Granitz Conference proceedings 20