Sciweavers

780 search results - page 69 / 156
» A Comparative Analysis of Selection Schemes Used in Genetic ...
Sort
View
DAS
2006
Springer
13 years 10 months ago
Extraction and Analysis of Document Examiner Features from Vector Skeletons of Grapheme 'th'
Abstract. This paper presents a study of 25 structural features extracted from samples of grapheme `th' that correspond to features commonly used by forensic document examiner...
Vladimir Pervouchine, Graham Leedham
MICCAI
2008
Springer
14 years 10 months ago
A Bayesian Approach for Liver Analysis: Algorithm and Validation Study
Abstract. We present a new method for the simultaneous, nearly automatic segmentation of liver contours, vessels, and metastatic lesions from abdominal CTA scans. The method repeat...
Moti Freiman, Ofer Eliassaf, Yoav Taieb, Leo Jo...
BMCBI
2008
123views more  BMCBI 2008»
13 years 9 months ago
Pol II promoter prediction using characteristic 4-mer motifs: a machine learning approach
Background: Eukaryotic promoter prediction using computational analysis techniques is one of the most difficult jobs in computational genomics that is essential for constructing a...
Firoz Anwar, Syed Murtuza Baker, Taskeed Jabid, Md...
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 2 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
EVOW
2003
Springer
14 years 2 months ago
Chromosomal Breakpoint Detection in Human Cancer
Chromosomal aberrations are differences in DNA sequence copy number of chromosome regions 3 . These differences may be crucial genetic events in the development and progression o...
Kees Jong, Elena Marchiori, Aad van der Vaart, Bau...