Abstract: In this paper we present an approach to creating Bi-directional Decision Support System (DSS) as an intermediary between an expert (U) and a machine learning (ML) system for choosing an optimal solution. As a first step, such DSS analyzes the stability of expert decision and looks for critical values in data that support such […]
Abstract: The shark crisis in the island of La Reunion requires innovative measures to secure sensible surfing and recreation shores. The CRA research center is developing a detection algorithm able to identify harmful sharks on underwater video images. This paper studies the Information System’s architecture and implementation to make this project possible. Please note that […]
A new approach is shown that mechanically proves various theorems in plane geometry by recasting them in terms of constraint satisfaction. A Python 3 implementation called GEOPAR affords transparent proofs of well-known theorems as well as new ones, including a generalization of Morley’s Theorem. Source: Generalizing Morley’s and Other Theorems with Automated Realization | SpringerLink
Researchers have identified a protein critical for the aggressiveness of T-cell leukemia, a subtype of leukemia that afflicts children and adults. Source: Protein responsible for leukemia’s aggressiveness identified — ScienceDaily
X-box binding protein 1 (XBP1), CD138 (Syndecan-1) and CS1 (SLAMF7) are highly expressed antigens in cancers including multiple myeloma (MM). Here, we identify and characterize immunogenic HLA-A24 peptides derived from these antigens for potential vaccination therapy of HLA-A24+ patients with MM. The identified immunogenic HLA-A24-specific XBP1 unspliced (UN)185–193 (I S P W I L A […]
The need for network management has always been recognized. At the same time, it recognized as overhead to selling equipment as well as a facility to smooth over the shortcomings of the equipment. Most datacomm networks in the 1970s and before were fairly small, often using equipment from a single vendor. While the network management […]
Source: Applying Data Mining Techniques Over Big Data With rapid development of information technology, data flows in different variety of formats – sensors data, tweets, photos, raw data, and unstructured data. Statistics show that there were 800,000 Petabytes stored in the world in 2000. Today Internet is about 1.8 Zettabytes (Zettabytes is 10^21), and this […]
Source: Factorization in the Cloud: Integer Factorization Using F# and Windows Azure Implementations are presented of two common algorithms for integer factorization, Pollard’s “p – 1” method and the SQUFOF method. The algorithms are implemented in the F# language, a functional programming language developed by Microsoft and officially released for the first time in 2010. […]
T-cell acute lymphoblastic leukemia (T-ALL) is an aggressive cancer of developing thymocytes, and remains fatal in 20% of pediatric and 50% of adult patients.1,2 Frequent application of multi-agent cytotoxic drugs leads to disease relapse and high toxicities, underscoring the need for targeted therapies. The suppression of aberrant NOTCH1 signaling in T-ALL cells by gamma secretase […]
High-risk human papillomaviruses (HPVs) are the causes of many cancers, including cervical, anal, vulvar, vaginal, penile and oropharyngeal. To facilitate diagnosis, prognosis and characterization of these cancers, it is necessary to make full use of the immunological data on HPV available through publications, technical reports and databases. These data vary in granularity, quality and complexity. […]