Techniques for clustering gene expression data

G Kerr, HJ Ruskin, M Crane, P Doolan - Computers in biology and …, 2008 - Elsevier
Many clustering techniques have been proposed for the analysis of gene expression data
obtained from microarray experiments. However, choice of suitable method (s) for a given …

A novel approach for data integration and disease subtyping

T Nguyen, R Tagett, D Diaz, S Draghici - Genome research, 2017 - genome.cshlp.org
Advances in high-throughput technologies allow for measurements of many types of omics
data, yet the meaningful integration of several different data types remains a significant …

A new intrusion detection system using support vector machines and hierarchical clustering

L Khan, M Awad, B Thuraisingham - The VLDB journal, 2007 - Springer
Whenever an intrusion occurs, the security and value of a computer system is compromised.
Network-based attacks make it difficult for legitimate users to access various network …

A novel intrusion detection system based on trust evaluation to defend against DDoS attack in MANET

M Poongodi, S Bose - Arabian Journal for Science and Engineering, 2015 - Springer
With the increasing demand of data communication in Internet and electronic commerce
environments, security of the data is the prime concern. Large-scale collaborative wireless …

Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement …

M Poongodi, S Bose - Cluster Computing, 2015 - Springer
The DDoS attack is more vulnerable attack in the self structured and infra structure less
MANET environment. The bot net based flooding attack is very cheap and easy to …

Detection and Prevention system towards the truth of convergence on decision using Aumann agreement theorem

M Poongodi, S Bose - Procedia Computer Science, 2015 - Elsevier
Abstract The Detection and Prevention system against many attacks has been formulated in
Mobile ad hoc networks to secure the data and to provide the uninterrupted service to the …

[PDF][PDF] The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation

M Poongodi, S Bose - Adv. Nat. Appl. Sci, 2015 - researchgate.net
DDoS, Distributed Denial of Service is an advanced form of DOS attacks which mainly focus
on target node by a group of attacker node that are geographically separated. In wired …

[PDF][PDF] 基因表达数据的聚类分析研究进展

岳峰, 孙亮, 王宽全, 王永吉, 左旺孟 - 自动化学报, 2008 - aas.net.cn
摘要基因表达数据的爆炸性增长迫切需求自动, 有效的数据分析工具. 目前聚类分析已成为分析
基因表达数据获取生物学信息的有力工具. 为了更好地挖掘基因表达数据 …

The GH-EXIN neural network for hierarchical clustering

G Cirrincione, G Ciravegna, P Barbiero, V Randazzo… - Neural Networks, 2020 - Elsevier
Hierarchical clustering is an important tool for extracting information from data in a multi-
resolution way. It is more meaningful if driven by data, as in the case of divisive algorithms …

Particle-size analysis for the pike 1 project, McMurray formation

M Abram, G Cain - Journal of Canadian Petroleum Technology, 2014 - onepetro.org
The unconsolidated sands of the Lower Cretaceous McMurray formation are the primary
host of the Athabasca oil-sands deposit in Alberta, Canada. Alberta has one of the world's …