Sciweavers

372 search results - page 65 / 75
» The Proportional Genetic Algorithm: Gene Expression in a Gen...
Sort
View
COMCOM
2002
189views more  COMCOM 2002»
13 years 7 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
BMCBI
2007
156views more  BMCBI 2007»
13 years 7 months ago
Predictive modeling of plant messenger RNA polyadenylation sites
Background: One of the essential processing events during pre-mRNA maturation is the posttranscriptional addition of a polyadenine [poly(A)] tail. The 3'-end poly(A) track pr...
Guoli Ji, Jianti Zheng, Yingjia Shen, Xiaohui Wu, ...
GECCO
2008
Springer
129views Optimization» more  GECCO 2008»
13 years 8 months ago
Exploiting the path of least resistance in evolution
Hereditary Repulsion (HR) is a selection method coupled with a fitness constraint that substantially improves the performance and consistency of evolutionary algorithms. This als...
Gearoid Murphy, Conor Ryan
KDD
2008
ACM
213views Data Mining» more  KDD 2008»
14 years 7 months ago
Heterogeneous data fusion for alzheimer's disease study
Effective diagnosis of Alzheimer's disease (AD) is of primary importance in biomedical research. Recent studies have demonstrated that neuroimaging parameters are sensitive a...
Jieping Ye, Kewei Chen, Teresa Wu, Jing Li, Zheng ...
BMCBI
2006
95views more  BMCBI 2006»
13 years 7 months ago
Estimate haplotype frequencies in pedigrees
Background: Haplotype analysis has gained increasing attention in the context of association studies of disease genes and drug responsivities over the last years. The potential us...
Qiangfeng Zhang, YuZhong Zhao, Guoliang Chen, Yun ...