Sciweavers

2346 search results - page 420 / 470
» Discovering Case Knowledge Using Data Mining
Sort
View
BMCBI
2010
167views more  BMCBI 2010»
13 years 7 months ago
Creating PWMs of transcription factors using 3D structure-based computation of protein-DNA free binding energies
Background: Knowledge of transcription factor-DNA binding patterns is crucial for understanding gene transcription. Numerous DNA-binding proteins are annotated as transcription fa...
Denitsa Alamanova, Philip Stegmaier, Alexander E. ...
ICIAP
2007
ACM
14 years 7 months ago
A Method for Blur and Similarity Transform Invariant Object Recognition
In this paper, we propose novel blur and similarity transform (i.e. rotation, scaling and translation) invariant features for the recognition of objects in images. The features ar...
Janne Heikkilä, Ville Ojansivu
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
14 years 1 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
MCS
2004
Springer
14 years 1 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
ICEIS
2003
IEEE
14 years 28 days ago
An XML View of the "World"
Abstract: The paper presents ”Any Input XML Output” (AIXO), a general and flexible software architecture for wrappers. The architecture has been designed to present data sourc...
Ezio Bartocci, Emanuela Merelli, Leonardo Mariani