An online system for metabolic network analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An online system for metabolic network analysis

Metabolic networks have become one of the centers of attention in life sciences research with the advancements in the metabolomics field. A vast array of studies analyzes metabolites and their interrelations to seek explanations for various biological questions, and numerous genome-scale metabolic networks have been assembled to serve for this purpose. The increasing focus on this topic comes w...

متن کامل

An Online Social Network-based Recommendation System

We have previously proposed to implement a social network-based recommendation system that uses data from and interfaces with the BoardGameGeek (BGG) website. The end result system will be usable by members of BGG to get recommendations given both their ratings history and their friend relationships. This report details the steps that we have taken so far and the steps that still need to be don...

متن کامل

network formulation for power system analysis

this paper presents as a brief introduction , the basic principles of matrix algebra for an alysing the power system problems with digital computers. the material contained in the text are as follows: primitive network, topology of electrical network, transformation of coordinates, bus admittance and bus impedance matrix.

متن کامل

Online Dimensional Controlling System for Drilling

The drilling is well known as one of the most common hole making processes in the industry.Due to close tolerance requirement for drilled holes in the most of work pieces, onlinecontrolling of the diameter of drilled holes seems to be necessary. In the current work, an onlinedimensional controlling system was developed for drilling process. Doing this, drilling processwas executed in different ...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Database

سال: 2014

ISSN: 1758-0463

DOI: 10.1093/database/bau091