If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (firstname.lastname@example.org). We will work to respond to each request in as timely a manner as possible.
Now showing items 1-6 of 6
A Multi-Cohort and Multi-Omics Meta-Analysis Framework to Identify Network-Based Gene Signatures
Although massive amounts of condition-specific molecular profiles are being accumulated in public repositories every day, meaningful interpretation of these data remains a major challenge. In an effort to identify the ...
Community assessment to advance computational prediction of cancer drug combinations in a pharmacogenomic screen
The effectiveness of most cancer targeted therapies is short-lived. Tumors often develop resistance that might be overcome with drug combinations. However, the number of possible combinations is vast, necessitating data-driven ...
Formation control for autonomous robots with collision and obstacle avoidance using a rotational and repulsive force-based approach
In this article, we address a formation control problem for a group of autonomous robots to track a moving target in the presence of obstacles. In the proposed method, desired formations, which consist of virtual nodes ...
A Comprehensive Survey of Tools and Software for Active Subnetwork Identification
A recent focus of computational biology has been to integrate the complementary information available in molecular profiles as well as in multiple network databases in order to identify connected regions that show significant ...
A New Data Fusion Algorithm for Wireless Sensor Networks Inspired by Hesitant Fuzzy Entropy
The wireless sensor network (WSN) is mainly composed of a large number of sensor nodes that are equipped with limited energy and resources. Therefore, energy consumption in wireless sensor networks is one of the most ...
Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection
This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs ...