نتایج جستجو برای: id3

تعداد نتایج: 936  

Journal: :PLoS Genetics 2007
Carrie M Garrett-Engele Michael A Tasch Harry C Hwang Matthew L Fero Roger M Perlmutter Bruce E Clurman James M Roberts

The cyclin-dependent kinase inhibitor p27(KIP1) is a tumor suppressor gene in mice, and loss of p27 protein is a negative prognostic indicator in human cancers. Unlike other tumor suppressors, the p27 gene is rarely mutated in tumors. Therefore misregulation of p27, rather than loss of the gene, is responsible for tumor-associated decreases in p27 protein levels. We performed a functional genom...

2018
Lucía Sanjurjo Gemma Aran Érica Téllez Núria Amézaga Carolina Armengol Daniel López Clara Prats Maria-Rosa Sarrias

CD5L (CD5 molecule-like) is a secreted glycoprotein that controls key mechanisms in inflammatory responses, with involvement in processes such as infection, atherosclerosis, and cancer. In macrophages, CD5L promotes an anti-inflammatory cytokine profile in response to TLR activation. In the present study, we questioned whether CD5L is able to influence human macrophage plasticity, and drive its...

Journal: :JBASE - Journal of Business and Audit Information Systems 2021

2017
Garima Sharma Gyan Ganga Santosh K. Vishwakarma

Management of huge amount of data has always been a matter of concern. With the increase in awareness towards education, the amount of data in educational institutes is also increasing. The increasing growth of educational databases, have given rise to a new field of data mining, known as Educational Data Mining (EDM). With the help of this one can predict the academic performance of a student ...

2012
MAHMOOD A. MAHMOOD HESHAM A. HEFNY

In this paper we propose a fuzzy rule generation approach based on granular computing using rough mereology (FRGAGCRM). The proposed system works in two phases. In the first phase, the pre-processing phase which use fuzzification methodology which map the numeric dataset into categorical dataset according to membership function described in this paper. In other hand, the second phase consists o...

2014
Kanani Arjun

In order to protect the data centrally when they are being transferred from one party to another party so, that it cannot be used for secondary purposes unrealized training dataset is an important technique used to prevent data. With help of Unrealized training dataset algorithm it divides the sample data in two forms i.e. Tp a set of perturbing datasets and T’ a set of output training datasets...

2013
M. Elemam Shehab K. Badran Gouda I. Salama

Inspired originally by the Learnable Evolution Model(LEM) a new presents of new classification algorithm called (LEM+ID3), which is based on the techniques from the learnable evolution models (LEM) to enhance convergence and accuracy of the algorithm and use of ID3 in order to construct the tree used in classification. In this paper a new version of LEM which convert LEM from optimization domai...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1994
M V Barone R Pepperkok F A Peverali L Philipson

Id1, Id2, and Id3 (HLH462) dimerize with members of the basic helix-loop-helix protein family, but due to the absence of the basic region, the resulting heterodimers cannot bind DNA. Therefore Id-type proteins negatively regulate DNA binding of the basic helix-loop-helix proteins. Here we report that Id1, Id2, and Id3 are induced shortly after serum stimulation in arrested NIH 3T3. Antisense ol...

1988
Suk Wah Kwok Chris Carter

This paper describes experiments, on two domains, to investigate the effect of averaging over predictions of multiple decision trees, instead of using a single tree. Other authors have pointed out theoretical and commonsense reasons for preferring· the multiple tree approach. Ideally, we would like to consider predictions from all trees, weighted by their probability. However, there is a vast·n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید