Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Advances in experimental technologies have given rise to tremendous amounts of biology data. This not only offers valuable sources of data to help understand biological evolution and functional mechanisms, but also poses challenges for accurate and effective data analysis. This book offers an essential introduction to the theoretical and practical aspects of association analysis, including data pre-processing, data mining methods/algorithms, and tools that are widely applied for computational biology. It covers significant recent advances in the field, both foundational and application-oriented, helping readers understand the basic principles and emerging techniques used to discover interesting association patterns in diverse and heterogeneous biology data, such as structure-function correlations, and complex networks with gene/protein regulation. The main results and approaches are described in an easy-to-follow way and accompanied by sufficient references and suggestions for future research. This carefully edited monograph is intended to provide investigators in the fields of data mining, machine learning, artificial intelligence, and bioinformatics with a profound guide to the role of association analysis in computational biology. It is also very useful as a general source of information on association analysis, and as an overall accompanying course book and self-study material for graduate students and researchers in both computer science and bioinformatics. .
Bioinformatics --- Data processing. --- Data mining. --- Expert systems (Computer science). --- Machine learning. --- Bioinformatics. --- Big data. --- Medical informatics. --- Data Mining and Knowledge Discovery. --- Knowledge Based Systems. --- Machine Learning. --- Computational and Systems Biology. --- Big Data. --- Health Informatics.
Choose an application
Biomathematics. Biometry. Biostatistics --- Biological techniques --- Programming --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- KBS (knowledge based system) --- datamining --- bio-informatica --- biologie --- programmeren (informatica) --- medische informatica --- gegevensanalyse --- data acquisition
Choose an application
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.
Computer networks --- Electronic commerce --- Computer network protocols. --- Security measures. --- Protocols, Computer network --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Information Technology --- Computer Science (Hardware & Networks) --- Computer Communication Networks. --- Software engineering. --- Operating systems (Computers). --- Data mining. --- Information storage and retrieva. --- Software Engineering/Programming and Operating Systems. --- Operating Systems. --- Software Engineering. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Operating systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Information storage and retrieval. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.
Computer science. --- Computer software. --- Database management. --- Information storage and retrieval systems. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Database Management. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computation by Abstract Devices. --- Mechanical Engineering --- Engineering & Applied Sciences --- Computer Science --- Mechanical Engineering - General --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Software, Computer --- Informatics --- Computers. --- Algorithms. --- Information storage and retrieval. --- Bioinformatics. --- Computational biology. --- Data mining. --- Biology --- Bioinformatics --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Bio-informatics --- Biological informatics --- Information science --- Computational biology --- Systems biology --- Data processing --- Information storage and retrieva. --- Artificial Intelligence. --- Science --- Computer systems --- Electronic data processing --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Application software. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.
Information retrieval --- Complex analysis --- Computer science --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- IR (information retrieval) --- complexe analyse (wiskunde) --- bio-informatica --- bedrijfssoftware --- computers --- informatica --- informatiesystemen --- database management --- KI (kunstmatige intelligentie) --- computerkunde --- robots
Choose an application
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.
Choose an application
This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
Computer security. --- Data mining. --- Artificial intelligence. --- Data encryption (Computer science). --- Systems and Data Security. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- datamining --- cryptografie --- informatica --- computerbeveiliging --- KI (kunstmatige intelligentie) --- data acquisition
Choose an application
Listing 1 - 9 of 9 |
Sort by
|