نتایج جستجو برای: grn reverse engineering models
تعداد نتایج: 1233163 فیلتر نتایج به سال:
BACKGROUND Monogenic dementias represent a great opportunity to trace disease progression from preclinical to symptomatic stages. Frontotemporal Dementia related to Granulin (GRN) mutations presents a specific framework of brain damage, involving fronto-temporal regions and long inter-hemispheric white matter bundles. Multimodal resting-state functional MRI (rs-fMRI) is a promising tool to care...
Genes communicate with each other through different regulatory effects, which lead to the emergence of complex network structures in cells, and such are expected be for normal cancerous cells. To study these differences, we have investigated Gene Regulatory Network (GRN) cells as inferred from RNA-sequencing data. The GRN is a signed weighted corresponding inductive or inhibitory interactions. ...
Applications of reverse engineering to speeding up a product realization process have gained momentum in recent years. The Internet has found increasingly more applications in manufacturing. Internet-based reverse engineering takes advantage of the recent developments in the above two areas. This paper presents the methodology of Internet-based reverse engineering and a case study will illustra...
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available , their focus has been on static HTML content and most ignore applet code completely. This paper presents a system that analyzes and tracks changes in Java ap-plets. The tool extracts information from applet code about classes, met...
This chapter introduces readers to the term reverse engineering (RE), and to the associated techniques that can be used for scanning physical parts. In addition, the chapter presents the process of reverse engineering and the strategy for scanning and converting the scanned data into a 3-D surface or solid model.
: Network security plays an increasingly important role in technology. As the world gets more and more interconnected, the need for security increases. While there are several tools that offer a fair amount of security, it is still crucial that students are educated well on the design and operation of malware, and learn to develop countermeasures that prevent malicious activity. To assist in th...
eMule is a popular peer-to-peer (p2p) client which builds upon the severbased eDonkey2000 (ed2k) platform. In newer versions of eMule, lookups can also be performed over the serverless Kad-network, an implementation of a distributed hash table (DHT) called Kademlia. Since only little is known about the techniques and algorithms used by eMule, this thesis presents an analysis of the implementati...
Recently a great deal of research into construction IT has been completed, and this is ongoing to improve efficiency and quality in the construction sector. The new innovation of 3D laser scanning is aimed at being used to improve the efficiency and quality of construction projects, such as maintenance of buildings or group of buildings that are going to be renovated for new services. The 3D la...
Software engineering research has focused mainly on software construction and has neglected software maintenance and evolution. Proposed is a shift in research from synthesis to analysis. Reverse engineering is introduced as a possible solution to program understanding and software analysis. Presented is reverse engineering technology developed as part of the Rigi project. The Rigi approach inv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید