標(biāo)題: Titlebook: Database and Expert Systems Applications; DEXA 2019 Internatio Gabriele Anderst-Kotsis,A Min Tjoa,Michael Granitz Conference proceedings 20 [打印本頁] 作者: concession 時(shí)間: 2025-3-21 18:09
書目名稱Database and Expert Systems Applications影響因子(影響力)
書目名稱Database and Expert Systems Applications影響因子(影響力)學(xué)科排名
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Database and Expert Systems Applications被引頻次
書目名稱Database and Expert Systems Applications被引頻次學(xué)科排名
書目名稱Database and Expert Systems Applications年度引用
書目名稱Database and Expert Systems Applications年度引用學(xué)科排名
書目名稱Database and Expert Systems Applications讀者反饋
書目名稱Database and Expert Systems Applications讀者反饋學(xué)科排名
作者: 轎車 時(shí)間: 2025-3-22 00:10 作者: 銀版照相 時(shí)間: 2025-3-22 03:35
Michel A. Beaudry,Vladimir C. Hachinskial length of factors re-occurring at each position of a string and this table is useful for text compression. The LPF table has the important role for computational biology, data compression and string algorithms. In this paper, we present an approach to compute the LPF table of a string from its su作者: 含水層 時(shí)間: 2025-3-22 05:56
Hydroponic Systems in Horticulturetelligently manage them. The advent of the Big Data era posed new challenges that led to the development of novel methods and tools, which were initially born to face with computational science problems, but which nowadays can be widely applied on biomedical data. In this work, we address two biomed作者: surmount 時(shí)間: 2025-3-22 09:13
Controlled Environment Horticulturetic organisms. They also seem to exist in viruses and perhaps in microbial pathogens to target the host. Drosha is the enzyme which first cleaves the pre-miRNA from the nascent pri-miRNA. Previously, we showed that it is possible to distinguish between pre-miRNAs of different species depending on th作者: 熔巖 時(shí)間: 2025-3-22 15:19
Microbial and Plant-Based Biostimulantsin backbone. Further refinements have been made since then, such as the description and identification of first 3, then 8 local conformational states [.]. The accuracy of 3-state secondary structure prediction has risen during last 3 decades and now we are approaching to the theoretical limit of 88–作者: 熔巖 時(shí)間: 2025-3-22 17:47 作者: 競選運(yùn)動(dòng) 時(shí)間: 2025-3-22 22:33 作者: SYN 時(shí)間: 2025-3-23 05:26 作者: CLOWN 時(shí)間: 2025-3-23 06:12 作者: cochlea 時(shí)間: 2025-3-23 13:26
Controlled Hypotension in Neuroanesthesiaincreasing guesses on the edit distance. If the strings share a certain degree of similarity, the edit distance can be quite smaller than the value of non-optimal solutions, and a large fraction (up?to 80–90%) of the DP matrix cells do not need to be computed. Including the method’s overhead, this t作者: 藕床生厭倦 時(shí)間: 2025-3-23 17:33
P. J. Morris,D. Heuser,D. G. McDowall of diseases and optimize biological environments such as bio-gas plants. Indexing of the protein sequence data allows to streamline the experiments and speed up the analysis. In our work, we present a schema for distributed column-based database management systems using a column-oriented index to s作者: modifier 時(shí)間: 2025-3-23 19:28 作者: Ingredient 時(shí)間: 2025-3-23 23:03 作者: magnanimity 時(shí)間: 2025-3-24 06:26
Liang-tseng Fan,Satish Kumar Singhever, such advances come with the risk of increased exposure to security vulnerabilities, threats, and attacks. Numerous vulnerabilities and potential attacks on these systems have been demonstrated. We posit that cyber-physical system software has to be designed and developed with security as a key作者: left-ventricle 時(shí)間: 2025-3-24 07:35
https://doi.org/10.1007/978-981-10-5181-4ernet. The sensitive nature of some of their data, their increasing interoperability puts their security at the forefront. In this paper we will show smart homes can resiliently be secured by varying functionality, exposure and authentication. We will demonstrate these mechanisms on simple smart hom作者: 煩擾 時(shí)間: 2025-3-24 12:50
Motivation: , in Controller Tuning derive an optimal .–differentially private noise adding mechanism for real-valued data matrices meant for the training of models by machine learning algorithms. The aim is to protect a machine learning algorithm from an adversary who seeks to gain an information about the data from algorithm’s outp作者: maudtin 時(shí)間: 2025-3-24 16:46 作者: 衣服 時(shí)間: 2025-3-24 22:01
Controller Tuning for Univariable Processesin avionics can be seen from recent incidents of unmanned aerial vehicles being hacked or in the hacking of vendor-controlled systems installed in commercial aircrafts. Over a million incidents related to security breaches at cyber layer have been recorded over the last decade, among which 350,000 c作者: Morbid 時(shí)間: 2025-3-25 02:03
Database and Expert Systems Applications978-3-030-27684-3Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: abracadabra 時(shí)間: 2025-3-25 04:40
Controlled Hypotension in Neuroanaesthesiaised clustering has received a great deal of interest, most methods rely on basic statistical or machine learning methods. In this paper we discuss a method based on the paraclique algorithm, and demonstrate its potential effectiveness through testing on four sets of publicly available gene expression microarray data.作者: nostrum 時(shí)間: 2025-3-25 08:27 作者: 違反 時(shí)間: 2025-3-25 14:36 作者: 兵團(tuán) 時(shí)間: 2025-3-25 16:44
978-3-030-27683-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: Melanocytes 時(shí)間: 2025-3-25 20:40
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/263484.jpg作者: 無底 時(shí)間: 2025-3-26 04:05
Smart Persistence and Accessibility of Genomic and Clinical Datand make them easily accessible through the development of a collection of Application Programming Interfaces (APIs), in order to provide a flexible framework that we called OpenOmics. To prove the validity of our approach, we apply it on data extracted from The Genomic Data Commons repository. OpenO作者: explicit 時(shí)間: 2025-3-26 05:50
Classification of Pre-cursor microRNAs from Different Species Using a New Set of Featuresnce) is possible with a combination of distance and regular k-mer features..The novel features specifically aid classification at closer evolutionary distances when compared to k-mers only. K-mer and k-mer distance features together lead to accurate classification for larger evolutionary distances s作者: Ganglion-Cyst 時(shí)間: 2025-3-26 11:11
Theoretical and Practical Analyses in Metagenomic Sequence Classificationmation derived from the known genomes and eventually used in the learning and classification processes may create several experimental issues—mostly based on the amount of information used in the processes and its uniqueness, significance, and redundancy,—and some of these issues are intrinsic both 作者: 尖叫 時(shí)間: 2025-3-26 16:41
Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Sec analyses can be used as springboards to a set of principles to help enunciate the assumptions and system-level security requirements useful as the bases for systems’ security validation and verification.作者: 卜聞 時(shí)間: 2025-3-26 18:23
Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight Simulatorthen mitigate the severity of the identified risks from level 4 to level 2 as per the IEC 61508 standard. The cryptosystem used for risk mitigation performed relatively faster as compared to some of the most recently proposed encryption schemes.作者: 有機(jī)體 時(shí)間: 2025-3-26 21:07
Gabriele Anderst-Kotsis,A Min Tjoa,Michael Granitz作者: MOAT 時(shí)間: 2025-3-27 01:21 作者: 油膏 時(shí)間: 2025-3-27 08:04
Controlled Environment Horticulturence) is possible with a combination of distance and regular k-mer features..The novel features specifically aid classification at closer evolutionary distances when compared to k-mers only. K-mer and k-mer distance features together lead to accurate classification for larger evolutionary distances s作者: Ambulatory 時(shí)間: 2025-3-27 10:13 作者: GROWL 時(shí)間: 2025-3-27 15:37 作者: 腐敗 時(shí)間: 2025-3-27 20:49 作者: 懦夫 時(shí)間: 2025-3-27 23:12
Conference proceedings 2019cations,?DEXA 2019, held in Linz, Austria, in August 2019: The 10th International Workshop on Biological Knowledge Discovery from Data, BIOKDD 2019,?? the 3rd International Workshop on Cyber-Security and Functional Safety in Cyber-Physical Systems, IWCFS 2019, the 1st International Workshop on Machi作者: COMA 時(shí)間: 2025-3-28 03:01
An Approach for LPF Table Computation computational biology, data compression and string algorithms. In this paper, we present an approach to compute the LPF table of a string from its suffix heap. The algorithm runs in linear time with linear memory space.作者: 光亮 時(shí)間: 2025-3-28 08:55
Speeding-Up the Dynamic Programming Procedure for the Edit Distance of Two Strings non-optimal solutions, and a large fraction (up?to 80–90%) of the DP matrix cells do not need to be computed. Including the method’s overhead, this translates into a speedup factor from . up?to . in the time needed to find the optimal solution for strings of length about 20,000.作者: Diuretic 時(shí)間: 2025-3-28 14:28
Microbial and Plant-Based Biostimulants90%. These improvements came from increasingly larger databases of protein sequences and structures for training, the use of template secondary structure information and more powerful deep learning techniques. In this paper we review the best four scorer servers which provide the highest accuracy for 3- and 8-state secondary structure prediction.作者: 培養(yǎng) 時(shí)間: 2025-3-28 15:03
Hydroponic Systems in Horticulture duplex sequence model. Compared with four conventional machine learning methods, the proposed LSTM model performs better in terms of the accuracy (ACC), sensitivity, specificity, AUC (Area under the curve) and F1 score. A web-tool is also developed to identify and display the microRNA target sites effectively and quickly.作者: dragon 時(shí)間: 2025-3-28 18:50 作者: 天氣 時(shí)間: 2025-3-29 02:31 作者: infatuation 時(shí)間: 2025-3-29 05:15 作者: Institution 時(shí)間: 2025-3-29 09:44
Controlled Hypotension in Neuroanesthesia non-optimal solutions, and a large fraction (up?to 80–90%) of the DP matrix cells do not need to be computed. Including the method’s overhead, this translates into a speedup factor from . up?to . in the time needed to find the optimal solution for strings of length about 20,000.作者: FLOUR 時(shí)間: 2025-3-29 11:45 作者: Narcissist 時(shí)間: 2025-3-29 19:31 作者: 否認(rèn) 時(shí)間: 2025-3-29 21:09
Protected Cropping in Horticulture k-means over the positive cases and then building up a classifier for every cluster separately. For a given new example, we apply all the generated classifiers. If it rejected by all of those classifiers, the given example will be considered as a negative case, otherwise it is a positive case.作者: 刺耳 時(shí)間: 2025-3-30 01:23
Motivation: , in Controller Tuninga machine learning algorithm are derived; (2) the noise distribution that, for a given level of entropy, minimizes the expected noise magnitude is derived; (3) using entropy level as the design parameter, the optimal entropy level and the corresponding probability density function of the noise are derived.作者: Orthodontics 時(shí)間: 2025-3-30 04:09 作者: Electrolysis 時(shí)間: 2025-3-30 10:27 作者: 假設(shè) 時(shí)間: 2025-3-30 14:16
P. J. Morris,D. Heuser,D. G. McDowalldifferent methods of transformation and evaluate those four different methods. The results show that our proposed extended radix tree has the best performance regarding memory consumption and calculation time. Hence, the radix tree is proved to be a suitable data structure for the transformation of protein sequences into the indexed schema.作者: 仲裁者 時(shí)間: 2025-3-30 16:31 作者: Microgram 時(shí)間: 2025-3-31 00:15
https://doi.org/10.1007/978-3-319-41301-3er structuring and selecting basic approaches in both areas, we propose appropriate links, which can be used as action areas for future development of trust models and computations in cyber-physical systems.作者: Infirm 時(shí)間: 2025-3-31 03:08 作者: 赤字 時(shí)間: 2025-3-31 06:01
Information Disclosure Detection in Cyber-Physical Systemss running Android, we postulate the importance of detecting information disclosure in any cyber-physical system. In this paper, we explore the detection of information disclosure by simulating devices and monitoring the information flows inside and among the devices.作者: 領(lǐng)巾 時(shí)間: 2025-3-31 12:46 作者: Cpr951 時(shí)間: 2025-3-31 16:00 作者: Glycogen 時(shí)間: 2025-3-31 19:26
mirLSTM: A Deep Sequential Approach to MicroRNA Target Binding Site Prediction duplex sequence model. Compared with four conventional machine learning methods, the proposed LSTM model performs better in terms of the accuracy (ACC), sensitivity, specificity, AUC (Area under the curve) and F1 score. A web-tool is also developed to identify and display the microRNA target sites effectively and quickly.作者: 歡樂中國 時(shí)間: 2025-4-1 00:07
Resilient Security of Medical Cyber-Physical Systems consideration by enforcing fail-safe modes, ensuring critical functionality and risk management. In this paper, we propose operating modes, risk models, and runtime threat estimation for automatic switching to fail-safe modes when a security threat or vulnerability has been detected.作者: CHURL 時(shí)間: 2025-4-1 05:52
An Approach for LPF Table Computational length of factors re-occurring at each position of a string and this table is useful for text compression. The LPF table has the important role for computational biology, data compression and string algorithms. In this paper, we present an approach to compute the LPF table of a string from its su作者: Neutropenia 時(shí)間: 2025-4-1 09:44
Smart Persistence and Accessibility of Genomic and Clinical Datatelligently manage them. The advent of the Big Data era posed new challenges that led to the development of novel methods and tools, which were initially born to face with computational science problems, but which nowadays can be widely applied on biomedical data. In this work, we address two biomed作者: GRATE 時(shí)間: 2025-4-1 10:20 作者: 灌溉 時(shí)間: 2025-4-1 15:49
A Review of Quasi-perfect Secondary Structure Prediction Serversin backbone. Further refinements have been made since then, such as the description and identification of first 3, then 8 local conformational states [.]. The accuracy of 3-state secondary structure prediction has risen during last 3 decades and now we are approaching to the theoretical limit of 88–作者: 主講人 時(shí)間: 2025-4-1 18:32
Theoretical and Practical Analyses in Metagenomic Sequence Classification primary objectives of metagenomic studies is to assign a taxonomic identity to each read sequenced from a sample and then to estimate the abundance of the known clades. With ever-increasing metagenomic datasets obtained from high-throughput sequencing technologies readily available nowadays, severa作者: Vertebra 時(shí)間: 2025-4-2 00:24
mirLSTM: A Deep Sequential Approach to MicroRNA Target Binding Site Prediction post-transcriptional level and cause translational inhibition or mRNA cleavage. Quick and effective detection of the binding sites of miRNAs is a major problem in bioinformatics. In this study, a deep learning approach based on Long Short Term Memory (LSTM) is developed with the help of an existing作者: 圓木可阻礙 時(shí)間: 2025-4-2 05:35