نتایج جستجو برای: id3

تعداد نتایج: 936  

Journal: :Mechanisms of Development 2009
Massimo Nichane Xi Ren Eric Bellefroid

A complex set of extracellular signals is required for neural crest (NC) specification. However, how these signals function to coordinate cell cycle progression and differentiation remains poorly understood. Here,we report inXenopus a role forStat3 inthis process downstream of FGF signaling. Depletion of Stat3 inhibited NC gene expression and proliferation while its overexpression expanded the ...

Journal: :Mechanisms of Development 2009
Noriko Matsumura Hiroki Kuroda

A complex set of extracellular signals is required for neural crest (NC) specification. However, how these signals function to coordinate cell cycle progression and differentiation remains poorly understood. Here,we report inXenopus a role forStat3 inthis process downstream of FGF signaling. Depletion of Stat3 inhibited NC gene expression and proliferation while its overexpression expanded the ...

2015
Adel Sabry EESA Zeynep ORMAN Adnan Mohsin Abdulazeez BRIFCANI

Intrusion detection systems (IDSs) have become a necessary component of computers and information security framework. IDSs commonly deal with a large amount of data traffic and these data may contain redundant and unimportant features. Choosing the best quality of features that represent all of the data and exclude the redundant features is a crucial topic in IDSs. In this paper, a new combinat...

1995
Jerzy W. Bala Jeffrey Huang Haleh Vafaie Kenneth DeJong Harry Wechsler

This paper introduces a hybrid learning methodology that integrates genetic algorithms (GAs) and decision tree learning (ID3) in order to evolve optimal subsets of discriminatory features for robust pattern classification. A GA is used to search the space of all possible subsets of a large set of candidate discrimination features. For a given feature subset, ID3 is invoked to produce a decision...

Journal: :The Journal of Experimental Medicine 2000
Hergen Spits Franka Couwenberg Arjen Q. Bakker Kees Weijer Christel H. Uittenbogaart

We found previously that Id3, which inhibits transcriptional activities of many basic helix-loop-helix transcription factors, blocked T and B cell development but stimulated natural killer (NK) cell development. Here we report that ectopic expression of Id3 and another Id protein, Id2, strongly inhibited the development of primitive CD34(+)CD38(-) progenitor cells into CD123(high) dendritic cel...

Journal: :Journal of immunology 2013
Mihalis Verykokakis Veena Krishnamoorthy Antonio Iavarone Anna Lasorella Mikael Sigvardsson Barbara L Kee

Invariant NKT (iNKT) cells display characteristics of both adaptive and innate lymphoid cells (ILCs). Like other ILCs, iNKT cells constitutively express ID proteins, which antagonize the E protein transcription factors that are essential for adaptive lymphocyte development. However, unlike ILCs, ID2 is not essential for thymic iNKT cell development. In this study, we demonstrated that ID2 and I...

Journal: :Computer systems science and engineering 2023

Cloud computing (CC) is an advanced technology that provides access to predictive resources and data sharing. The cloud environment represents the right type regarding usage model ownership, size, rights access. It introduces scope nature of computing. In recent times, all processes are fed into system for which consumer cache size required. One most security issues in Distributed Denial Servic...

Journal: :Blood 1999
A C Jaleco A P Stegmann M H Heemskerk F Couwenberg A Q Bakker K Weijer H Spits

Transgenic and gene targeted mice have contributed greatly to our understanding of the mechanisms underlying B-cell development. We describe here a model system that allows us to apply molecular genetic techniques to the analysis of human B-cell development. We constructed a retroviral vector with a multiple cloning site connected to a gene encoding green fluorescent protein by an internal ribo...

2014
Badr HSSINA Abdelkarim MERBOUHA Hanane EZZIKOURI Mohammed ERRITALI

Data mining is the useful tool to discovering the knowledge from large data. Different methods & algorithms are available in data mining. Classification is most common method used for finding the mine rule from the large database. Decision tree method generally used for the Classification, because it is the simple hierarchical structure for the user understanding & decision making. Various data...

2012
Sandeep Kumar

Intrusion detection technology exists a lot of problems, such as low performance, low intelligent level, high false alarm rate, high false negative rate and so on. There is a need to develop some robust decision tree in order to produce effective decision rules from the attacked data. In this paper, ID3 decision tree classification method is used to build an effective decision tree for intrusio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید