This paper presents a computer-aided approach to enhancing suspicious lesions in digital mammograms. The developed algorithm improves on a well-known preprocessor filter named cont...
Abstract. This paper describes two methodologies for performing distributed particle filtering in a sensor network. It considers the scenario in which a set of sensor nodes make m...
Background: It has repeatedly been shown that interacting protein families tend to have similar phylogenetic trees. These similarities can be used to predicting the mapping betwee...
The IEEE 802.16e system for multicast and broadcast service (MBS) is further investigated over [4]. It is shown that 802.16e networks can exploit advanced transmission and flexibl...
Guocong Song, Kenneth Stewart, Robert Love, Xiangy...
Background: RNA interference (RNAi) is a naturally occurring phenomenon that results in the suppression of a target RNA sequence utilizing a variety of possible methods and pathwa...