MULTI-COMPARTMENTED BIOLOGIC MODELS
نویسندگان
چکیده
منابع مشابه
Joint Compartmented Threshold Access Structures
A secret sharing scheme is a method of distributing a secret value among members of a group such that only certain coalitions of these participants can find the secret. A subset of users that can recover the secret is called a qualified coalition, and the set of all qualified coalitions is called the access structure. An access structure is called monotone if every coalition containing a qualif...
متن کاملRegionally compartmented groundwater flow on Mars
[1] Groundwater flow on Mars likely contributed to the formation of several types of morphologic and mineralogic features, including chaotic terrains, valley networks, Meridiani Planum geologic units and, potentially, sulfate and phyllosilicate deposits. A central issue for these features is the spatial scale of groundwater flow required for their formation. For groundwater simulation purposes,...
متن کاملA comprehensive evaluation of constraining amino acid biosynthesis in compartmented models for metabolic flux analysis
Recent advances in the availability and applicability of genetic tools for non-conventional yeasts have raised high hopes regarding the industrial applications of such yeasts; however, quantitative physiological data on these yeasts, including intracellular flux distributions, are scarce and have rarely aided in the development of novel yeast applications. The compartmentation of eukaryotic cel...
متن کاملBayesian Optimum Design Criterion for Multi Models Discrimination
The problem of obtaining the optimum design, which is able to discriminate between several rival models has been considered in this paper. We give an optimality-criterion, using a Bayesian approach. This is an extension of the Bayesian KL-optimality to more than two models. A modification is made to deal with nested models. The proposed Bayesian optimality criterion is a weighted average, where...
متن کاملTowards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks
Identity theft through phishing attacks has fostered to a major concern of Internet users. Classical phishing attacks aim at luring the user to a faked web site to disclose personal information. Various solutions have been proposed against this kind of attack. However, these solutions can hardly counter the new generation of sophisticated malware phishing attacks designed to target certain serv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Clinical Endocrinology & Metabolism
سال: 1954
ISSN: 0021-972X,1945-7197
DOI: 10.1210/jcem-14-9-1079