Filters








144,481 Hits in 3.8 sec

Zenodo Archive for "Improved radiation expression profiling by sequential application of sensitive and specific gene signatures"

Eliseos J Mucaki, Ben C. Shirley, Peter K Rogan
2021 Zenodo  
This is the Zenodo archive for the research article "Improved radiation expression profiling by sequential application of sensitive and specific gene signatures" (Mucaki et al. 2021).  ...  -2021.pdf" This document describes how to prepare external expression data sets to be tested by these radiation gene signatures, how to import the expression data and gene signature MAT files into MATLAB  ...  Zenodo Archive for "Improved radiation expression profiling by sequential application of sensitive and specific gene signatures" https://doi.org/10.5281/zenodo.5009007 Zenodo Archive for "Improved  ... 
doi:10.5281/zenodo.5655494 fatcat:2vognefm7re6xlylk2mk3iav2q

Introduction of the Signature Classification Development System [chapter]

Lawrence M. Brown, Jeffrey S. Lin
1996 Review of Progress in Quantitative Nondestructive Evaluation  
SCDS supports user defined templates, thus the template routines can be tailored to a specific application. The Gate folder provides a spread-sheet to define various gates for the signatures.  ...  The GUI interface provides the following control of the SCDS: • selection of data files and signatures, • allocation of signatures for training, testing and validation sets, • selection of DSP functions  ... 
doi:10.1007/978-1-4613-0383-1_107 fatcat:yl6xavvmzvaixpvijxmdgowjoe

Media-based navigation with generic links

Paul H. Lewis, Hugh C. Davis, Steve R. Griffiths, Wendy Hall, Rob J. Wilkins
1996 Proceedings of the the seventh ACM conference on Hypertext - HYPERTEXT '96  
Thanks also to Nick Beitner for the equestrian video and to Mark Dobie for technical support.  ...  The ability to set specific modules to operate for specific applications has a second side effect.  ...  A skeleton source code file containing stubs for all module specific code, complete with examples for each stub is provided.  ... 
doi:10.1145/234828.234849 dblp:conf/ht/LewisDGHW96 fatcat:67rmrtxmiffcjo6uebt6ys6wne

Immunity based virus detection with process call arguments and user feedback

Zhou Li, Yiwen Liang, Zejun Wu, Chengyu Tan
2007 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems  
In the stage of testing, user feedback is analyzed to adjust the threshold between normal files and viruses.  ...  Current virus detection approaches greatly require preknowledge of virus signatures, such as anti-virus tools. In this paper, we present a new immunity based virus detection approach.  ...  And the experiments show that this approach can detect Macro Virus while avoid mistaking normal applications for virus without preknowledge of the specific virus and specific application.  ... 
doi:10.1109/bimnics.2007.4610081 fatcat:ltpwy6p2vzdl3e7yhoq2a6etfq

Immunity based Virus Detection with Process Call Arguments and User Feedback

Zhou Li, Yiwen Liang, Zejun Wu, Chengyu Tan
2007 Proceedings of the 2nd International Conference on Bio-Inspired Models of Network Information and Computing Systems  
In the stage of testing, user feedback is analyzed to adjust the threshold between normal files and viruses.  ...  Current virus detection approaches greatly require preknowledge of virus signatures, such as anti-virus tools. In this paper, we present a new immunity based virus detection approach.  ...  And the experiments show that this approach can detect Macro Virus while avoid mistaking normal applications for virus without preknowledge of the specific virus and specific application.  ... 
doi:10.4108/icst.bionetics2007.2447 dblp:conf/bionetics/LiLWT07 fatcat:obhgeskttngunb2fjapnjhxm6m

Design and implementation of a configurable system for managing X509 certificates

Maja Vukasović, Bogdana Veselinović, Žarko Stanisavljević
2018 Telfor Journal  
In this paper a design and an implementation of a configurable system for managing the X509 certificates is described.  ...  After the CSR is signed, CA stores the reply into a file which afterwards can be imported and stored into local key store, thus adding a signature to the selected key pair. V.  ...  Afterwards he creates MyCode class extended from a specific base class placed in .jar file.  ... 
doi:10.5937/telfor1802102v fatcat:5q3zbs5byvgxvaihq76udvjmxu

PROGgene: gene expression based survival analysis web application for multiple cancers

Chirayu Goswami, Harikrishna Nakshatri
2013 Journal of Clinical Bioinformatics  
When multiple genes are being studied, the application also produces a plot for average gene expression for full signature.  ...  In several such studies gene signatures have been developed specific for prognostication in particular subtype of a cancer, for instance, a subgroup of population treated with a specific drug. 70 Gene  ...  Funding This study was partly supported by IUPUI Breast Cancer Signature Center and Susan G. Komen for the Cure grant SAC110025 (to HN).  ... 
doi:10.1186/2043-9113-3-22 pmid:24165311 pmcid:PMC3875898 fatcat:2xkar753fngzdfmb5cy3iuo5ui

HTSFinder: Powerful Pipeline of DNA Signature Discovery by Parallel and Distributed Computing

Ramin Karimi, Andras Hajdu
2016 Evolutionary Bioinformatics  
Our application can detect both unique and common signatures in the arbitrarily selected target and nontarget databases.  ...  Like an alignment-free approach, DNA signatures have provided new opportunities for the rapid identification of species.  ...  Special thanks also to the Faculty of Informatics and Department of Computer Graphics and Image Processing at the University of Debrecen for providing computational resources for this research.  ... 
doi:10.4137/ebo.s35545 pmid:26884678 pmcid:PMC4750899 fatcat:upsfel2vjfdizd32tzgylyepqu

Anti-Forensic Trace Detection in Digital Forensic Triage Investigations

Kyoung Park, Jung-Min Park, Eun-jin Kim, Chang Cheon, Joshua James
2017 Journal of Digital Forensics, Security and Law  
Based on identified challenges, a method of signature-based anti-forensic trace detection is proposed for triage purposes that will assist investigators in quickly making decisions about the suspect digital  ...  For each selected program, the file system (and Registry) monitor was started, and each action relating to the specific program was executed.  ...  A selection of unique traces for each action associated with the anti-forensic program 'Eraser' is given in table 2. 3.1.5 Define traces in resulting signature as regular expressions for portability As  ... 
doi:10.15394/jdfsl.2017.1421 fatcat:dhkfodfo4fdyjlofr26ddri7pa

Controlling and Protecting Windows Applications by Analyzing and Manipulating PE File Format

Rawaa Qasha, Zaid Monther
2012 ˜Al-œRafidain journal for computer sciences and mathematics  
in the computer by saving viruses signatures in a specified file and scanning all PE files.  ...  The objective of the research is to control the executable files of the Windows system in order to provide protection for these files and the system as a whole.  ...  This part consists of several steps including: -Obtaining a signature for virus file using special purpose programs, such as OllyDbg. The first 128 byte is selected as virus signature.  ... 
doi:10.33899/csmj.2012.163668 fatcat:va3b2loa7rc5zcq7lc4iwnosxa

SCUDO: a tool for signature-based clustering of expression profiles

Mario Lauria, Petros Moyseos, Corrado Priami
2015 Nucleic Acids Research  
The tool is based on a new method for the clustering of profiles based on a subject-specific, as opposed to disease-specific, signature.  ...  SCUDO (Signature-based ClUstering for DiagnOstic purposes) is an online tool for the analysis of gene expression profiles for diagnostic and classification purposes.  ...  The user can also download a file containing the subject specific signatures (one column per subject) plus two 'consensus signatures' (one for each Nucleic Acids Research, 2015, Vol. 43, Web Server issue  ... 
doi:10.1093/nar/gkv449 pmid:25958391 pmcid:PMC4489218 fatcat:tcte7n5urnctnmv3ivrq5de3uu

A publicly available repository of ROH islands reveals signatures of selection in different livestock and pet species

Wim Gorssen, Roel Meyermans, Steven Janssens, Nadine Buys
2021 Genetics Selection Evolution  
similar signatures of selection.  ...  Moreover, ROH are suited to detect signatures of selection via ROH islands and are used in other applications, such as genomic prediction and genome-wide association studies (GWAS).  ...  Acknowledgements Not applicable.  ... 
doi:10.1186/s12711-020-00599-7 pmid:33397285 fatcat:uyfypnhginhjpb3gynbrrqhmpa

Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS [chapter]

F. S. de Paula, P. L. de Geus
2004 Lecture Notes in Computer Science  
This IDS is initially designed to deal with application attacks, extracting signature for remote buffer overflow attacks.  ...  The authors would like to thank the FAPESP agency and the State University of Mato Grosso do Sul (UEMS) for supporting this research.  ...  An application-specific procedure decodes the related application-level protocol delivering the request to be analyzed.  ... 
doi:10.1007/978-3-540-27824-5_141 fatcat:eevqi64buje7dlm7uawuazgkv4

Knowledge Driven Variable Selection (KDVS) – a new approach to enrichment analysis of gene signatures obtained from high–throughput data

Grzegorz Zycinski, Annalisa Barla, Margherita Squillario, Tiziana Sanavia, Barbara Di Camillo, Alessandro Verri
2013 Source Code for Biology and Medicine  
derived from the threshold-dependent selection, the mapping to the biological concepts, and the signature coverage.  ...  The most frequently used approaches first select a set of genes (i.e. gene signature) able to characterize differences between two or more phenotypical conditions, and then provide a functional assessment  ...  Acknowledgements We thank Salvatore Masecchia for the development of L1L2Py and PPlus.  ... 
doi:10.1186/1751-0473-8-2 pmid:23302187 pmcid:PMC3605163 fatcat:nfljrwaaqzglha6mfkr4c2zoei

A Tool for Collecting Domain Dependent Sortal Constraints From Corpora [article]

Francois Andry, Mark Gawron, John Dowding, Robert Moore
1995 arXiv   pre-print
In this paper, we describe a tool designed to generate semi-automatically the sortal constraints specific to a domain to be used in a natural language (NL) understanding system.  ...  Building the signature file For the this first experimental exercise with the sort tool, we built the signature file somewhat differently than we would build it for a new application.  ...  In the Gemini system, the domain-specific knowledge base includes a sort hierarchy and a set of sort rules that provide (largely domain-specific) selectional restrictions for every predicate invoked by  ... 
arXiv:cmp-lg/9501005v1 fatcat:7ja4o33pa5bidcgqz2h6hcibk4
« Previous Showing results 1 — 15 out of 144,481 results