Techniques for clustering gene expression data
Many clustering techniques have been proposed for the analysis of gene expression data
obtained from microarray experiments. However, choice of suitable method (s) for a given …
obtained from microarray experiments. However, choice of suitable method (s) for a given …
A novel approach for data integration and disease subtyping
Advances in high-throughput technologies allow for measurements of many types of omics
data, yet the meaningful integration of several different data types remains a significant …
data, yet the meaningful integration of several different data types remains a significant …
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised.
Network-based attacks make it difficult for legitimate users to access various network …
Network-based attacks make it difficult for legitimate users to access various network …
A novel intrusion detection system based on trust evaluation to defend against DDoS attack in MANET
M Poongodi, S Bose - Arabian Journal for Science and Engineering, 2015 - Springer
With the increasing demand of data communication in Internet and electronic commerce
environments, security of the data is the prime concern. Large-scale collaborative wireless …
environments, security of the data is the prime concern. Large-scale collaborative wireless …
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement …
M Poongodi, S Bose - Cluster Computing, 2015 - Springer
The DDoS attack is more vulnerable attack in the self structured and infra structure less
MANET environment. The bot net based flooding attack is very cheap and easy to …
MANET environment. The bot net based flooding attack is very cheap and easy to …
Detection and Prevention system towards the truth of convergence on decision using Aumann agreement theorem
M Poongodi, S Bose - Procedia Computer Science, 2015 - Elsevier
Abstract The Detection and Prevention system against many attacks has been formulated in
Mobile ad hoc networks to secure the data and to provide the uninterrupted service to the …
Mobile ad hoc networks to secure the data and to provide the uninterrupted service to the …
[PDF][PDF] The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation
M Poongodi, S Bose - Adv. Nat. Appl. Sci, 2015 - researchgate.net
DDoS, Distributed Denial of Service is an advanced form of DOS attacks which mainly focus
on target node by a group of attacker node that are geographically separated. In wired …
on target node by a group of attacker node that are geographically separated. In wired …
[PDF][PDF] 基因表达数据的聚类分析研究进展
岳峰, 孙亮, 王宽全, 王永吉, 左旺孟 - 自动化学报, 2008 - aas.net.cn
摘要基因表达数据的爆炸性增长迫切需求自动, 有效的数据分析工具. 目前聚类分析已成为分析
基因表达数据获取生物学信息的有力工具. 为了更好地挖掘基因表达数据 …
基因表达数据获取生物学信息的有力工具. 为了更好地挖掘基因表达数据 …
The GH-EXIN neural network for hierarchical clustering
Hierarchical clustering is an important tool for extracting information from data in a multi-
resolution way. It is more meaningful if driven by data, as in the case of divisive algorithms …
resolution way. It is more meaningful if driven by data, as in the case of divisive algorithms …
Particle-size analysis for the pike 1 project, McMurray formation
M Abram, G Cain - Journal of Canadian Petroleum Technology, 2014 - onepetro.org
The unconsolidated sands of the Lower Cretaceous McMurray formation are the primary
host of the Athabasca oil-sands deposit in Alberta, Canada. Alberta has one of the world's …
host of the Athabasca oil-sands deposit in Alberta, Canada. Alberta has one of the world's …