- Computing and Information Systems - Research Publications
Computing and Information Systems - Research Publications
Permanent URI for this collection
Search Results
Now showing
1 - 10 of 78
-
ItemPhenDisco: phenotype discovery system for the database of genotypes and phenotypes.Doan, S ; Lin, K-W ; Conway, M ; Ohno-Machado, L ; Hsieh, A ; Feupe, SF ; Garland, A ; Ross, MK ; Jiang, X ; Farzaneh, S ; Walker, R ; Alipanah, N ; Zhang, J ; Xu, H ; Kim, H-E (Oxford University Press (OUP), 2014)The database of genotypes and phenotypes (dbGaP) developed by the National Center for Biotechnology Information (NCBI) is a resource that contains information on various genome-wide association studies (GWAS) and is currently available via NCBI's dbGaP Entrez interface. The database is an important resource, providing GWAS data that can be used for new exploratory research or cross-study validation by authorized users. However, finding studies relevant to a particular phenotype of interest is challenging, as phenotype information is presented in a non-standardized way. To address this issue, we developed PhenDisco (phenotype discoverer), a new information retrieval system for dbGaP. PhenDisco consists of two main components: (1) text processing tools that standardize phenotype variables and study metadata, and (2) information retrieval tools that support queries from users and return ranked results. In a preliminary comparison involving 18 search scenarios, PhenDisco showed promising performance for both unranked and ranked search comparisons with dbGaP's search engine Entrez. The system can be accessed at http://pfindr.net.
-
ItemA lagrangian relaxation and ACO hybrid for resource constrained project scheduling with discounted cash flowsThiruvady, D ; Wallace, M ; Gu, H ; Schutt, A (SPRINGER, 2014-12-01)
-
ItemAgent-Based Simulation of Holocene Monsoon Precipitation Patterns and Hunter-Gatherer Population Dynamics in Semi-arid EnvironmentsBalbo, AL ; Rubio-Campillo, X ; Rondelli, B ; Ramirez, M ; Lancelotti, C ; Torrano, A ; Salpeteur, M ; Lipovetzky, N ; Reyes-Garcia, V ; Montanola, C ; Madella, M (SPRINGER, 2014-06-01)
-
ItemCryptographic protocols with everyday objectsHeather, J ; Schneider, S ; Teague, V (SPRINGER, 2014-01-01)Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes.
-
ItemEvaluating influence of microRNA in reconstructing gene regulatory networksChowdhury, AR ; Chetty, M ; Nguyen, XV (SPRINGER, 2014-06-01)Gene regulatory network (GRN) consists of interactions between transcription factors (TFs) and target genes (TGs). Recently, it has been observed that micro RNAs (miRNAs) play a significant part in genetic interactions. However, current microarray technologies do not capture miRNA expression levels. To overcome this, we propose a new technique to reverse engineer GRN from the available partial microarray data which contains expression levels of TFs and TGs only. Using S-System model, the approach is adapted to cope with the unavailability of information about the expression levels of miRNAs. The versatile Differential Evolutionary algorithm is used for optimization and parameter estimation. Experimental studies on four in silico networks, and a real network of Saccharomyces cerevisiae called IRMA network, show significant improvement compared to traditional S-System approach.
-
ItemExplaining circuit propagationFrancis, KG ; Stuckey, PJ (SPRINGER, 2014-01-01)
-
ItemGeneralised blockmodelling of social and relational networks using evolutionary computingChan, J ; Lam, S ; Hayes, C (SPRINGER WIEN, 2014-12-01)
-
ItemGenerating multiple alternative clusterings via globally optimal subspacesDang, XH ; Bailey, J (SPRINGER, 2014-05-01)
-
ItemInformation security strategies: towards an organizational multi-strategy perspectiveAhmad, A ; Maynard, SB ; Park, S (SPRINGER, 2014-04-01)
-
ItemLooking into the crystal-ball: a bright future for CPMilano, M ; Van Hentenryck, P (SPRINGER, 2014-04-01)