نتایج جستجو برای: grn reverse engineering models

تعداد نتایج: 1233163  

2010
Alina Sîrbu Heather J. Ruskin Martin Crane

BACKGROUND Inferring Gene Regulatory Networks (GRNs) from time course microarray data suffers from the dimensionality problem created by the short length of available time series compared to the large number of genes in the network. To overcome this, data integration from diverse sources is mandatory. Microarray data from different sources and platforms are publicly available, but integration i...

2011
Mathieu Acher Anthony Cleve Philippe Collet Philippe Merle Laurence Duchien Philippe Lahire

Reverse engineering the variability of an existing system is a challenging activity. The architect knowledge is essential to identify variation points and explicit constraints between features, for instance in feature models (FMs), but the manual creation of FMs is both timeconsuming and error-prone. On a large scale, it is very difficult for an architect to guarantee that the resulting FM ensu...

Journal: :Science of Computer Programming 2000

Journal: :Physica D: Nonlinear Phenomena 2021

Motivated by studying synchronization mechanisms in gene regulatory networks (GRNs) and their relation to evolutionary events such as genetic duplication redundancy, we consider two types of mathematical dynamical models GRNs that depict general additive (SUM model) or multiplicative (MULT regulations. By a synchrony pattern mean clusters synchronized genes whose states coincide for all time. T...

Journal: :international journal of advanced design and manufacturing technology 0
mohammadmahdi amiri research institute of petroleum industry (ripi),

nowadays cmm machines are widely used in surface measurement and inspection. as inspection results from cmm machine are obtained by the means of measuring surfaces with direct contact, they are more precise than non-contact method (like optical measurement). however, cmm machines give more reliable and accurate results rather than non-contact methods but also these results come with error when ...

Journal: :isecure, the isc international journal of information security 0
sh. zamanzadeh computer science and engineering department, shahid beheshti university, tehran, iran a. jahanian computer science and engineering department, shahid beheshti university, tehran, iran

fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. in untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious trojans. understanding the netlist topology is the ultimate goal of the reverse engineering process. in this paper, we propose...

2017
Xi Chen Qiao-Ling Wang Meng-Hui Zhang

The current study aimed to identify key genes in glaucoma based on a benchmarked dataset and gene regulatory network (GRN). Local and global noise was added to the gene expression dataset to produce a benchmarked dataset. Differentially-expressed genes (DEGs) between patients with glaucoma and normal controls were identified utilizing the Linear Models for Microarray Data (Limma) package based ...

Journal: :Annals of Pure and Applied Logic 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید