An online system for metabolic network analysis
نویسندگان
چکیده
منابع مشابه
An online system for metabolic network analysis
Metabolic networks have become one of the centers of attention in life sciences research with the advancements in the metabolomics field. A vast array of studies analyzes metabolites and their interrelations to seek explanations for various biological questions, and numerous genome-scale metabolic networks have been assembled to serve for this purpose. The increasing focus on this topic comes w...
متن کاملAn Online Social Network-based Recommendation System
We have previously proposed to implement a social network-based recommendation system that uses data from and interfaces with the BoardGameGeek (BGG) website. The end result system will be usable by members of BGG to get recommendations given both their ratings history and their friend relationships. This report details the steps that we have taken so far and the steps that still need to be don...
متن کاملnetwork formulation for power system analysis
this paper presents as a brief introduction , the basic principles of matrix algebra for an alysing the power system problems with digital computers. the material contained in the text are as follows: primitive network, topology of electrical network, transformation of coordinates, bus admittance and bus impedance matrix.
متن کاملOnline Dimensional Controlling System for Drilling
The drilling is well known as one of the most common hole making processes in the industry.Due to close tolerance requirement for drilled holes in the most of work pieces, onlinecontrolling of the diameter of drilled holes seems to be necessary. In the current work, an onlinedimensional controlling system was developed for drilling process. Doing this, drilling processwas executed in different ...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Database
سال: 2014
ISSN: 1758-0463
DOI: 10.1093/database/bau091