Informatics

Optimal Treatment Strategy for a Tumor Model under Immune Suppression
We propose a mathematical model describing tumor-immune interactions under immune suppression. These days evidences indicate that the immune suppression related to cancer contributes to its progression. The mathematical model for tumor-immune interactions would provide a new methodology for more sophisticated treatment options of cancer. To do this we have developed a system of 11 ordinary diff...


Analysis of Epileptic Seizures with Complex Network
Epilepsy is a disease of abnormal neural activities involving large area of brain networks. Until now the nature of functional brain network associated with epilepsy is still unclear. Recent researches indicate that the small world or scale-free attributes and the occurrence of highly clustered connection patterns could represent a general organizational principle in the human brain functional ...
Neurophysiological Tools to Investigate Consumer’s Gender Differences during the Observation of TV Commercials
Neuromarketing is a multidisciplinary field of research whose aim is to investigate the consumers’ reaction to advertisements from a neuroscientific perspective. In particular, the neuroscience field is thought to be able to reveal information about consumer preferences which are unobtainable through conventional methods, including submitting questionnaires to large samples of consumers or pe...


PLI Cancellation in ECG Signal Based on Adaptive Filter by Using Wiener-Hopf Equation for Providing Initial Condition
This paper presents a technique for finding the optimal initial weight for adaptive filter by using difference equation. The obtained analytical response of the system identifies the appropriate weights for the system and shows that the MSE depends on the initial weight. The proposed technique is applied to eliminate the known frequency power line interference (PLI) signal in the electrocardiog...
Limited memory BFGS method based on a high-order tensor model
This paper is aimed to employ a modified quasi-Newton equation in the framework of the limited memory BFGS method to solve large-scale unconstrained optimization problems. The modified secant equation is derived by means of a forth order tensor model to improve the curvature information of the objective function. The global and local convergence properties of the modified LBFGS method, on unifo...


Dynamic behaviors and soliton solutions of the modified Zakharov–Kuznetsov equation in the electrical transmission line
The modified Zakharov–Kuznetsov (mZK) equation in the electrical transmission line is investigated in this paper. Different expressions on the parameters in the mZK equation are given. By means of the Hirota method, bilinear forms and soliton solutions of the mZK equation are obtained. Linear-stability analysis yields the instability condition for such soliton solutions. We find that the soli...
Web Spider Defense Technique in Wireless Sensor Networks
Wireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioin...

A Graph Embedding Method Based on Sparse Representation for Wireless Sensor Network Localization
In accordance with the problem that the traditional trilateral or multilateral estimation localization method is highly dependent on the proportion of beacon nodes and the measurement accuracy, an algorithm based on kernel sparse preserve projection (KSPP) is proposed in this dissertation. The Gaussian kernel function is used to evaluate the similarity between nodes, and the location of the unk...
APADB: a database for alternative polyadenylation and microRNA regulation events
Alternative polyadenylation (APA) is a widespread mechanism that contributes to the sophisticated dynamics of gene regulation. Approximately 50% of all protein-coding human genes harbor multiple polyadenylation (PA) sites; their selective and combinatorial use gives rise to transcript variants with differing length of their 3' untranslated region (3'UTR). Shortened variants escape UTR-mediated ...

Standardized description of scientific evidence using the Evidence Ontology (ECO)
The Evidence Ontology (ECO) is a structured, controlled vocabulary for capturing evidence in biological research. ECO includes diverse terms for categorizing evidence that supports annotation assertions including experimental types, computational methods, author statements and curator inferences. Using ECO, annotation assertions can be distinguished according to the evidence they are based on s...
Assisting manual literature curation for protein-protein interactions using BioQRator
The time-consuming nature of manual curation and the rapid growth of biomedical literature severely limit the number of articles that database curators can scrutinize and annotate. Hence, semi-automatic tools can be a valid support to increase annotation throughput. Although a handful of curation assistant tools are already available, to date, little has been done to formally evaluate their ben...

Nonlinear analysis of soil–structure interaction using perfectly matched discrete layers
When nonlinear behaviors of soil are important in a soil–structure interaction system, radiation of energy into the infinity of the soil as well as the nonlinearity must be considered rigorously. In this study, perfectly matched discrete layers (PMDLs) are employed to represent the radiation of energy rigorously. A time-domain formulation for a soil–structure interaction is given using the ...
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks
Wireless Sensor Networks (WSN) consist of small battery-limited devices called sensor nodes. The communication between sensor nodes is a type of peer-to-peer communication, since each node has the same capability and role. One of the recent application areas of these nodes is underwater sensing. Communication in Underwater Wireless Sensor Networks (UWSN) is challenging since radio frequencies c...
Router architecture evaluation for security network
This paper presents and evaluates router architectures for security networks. Through extensive simulations, the DAMQWR and PD-CB router architecture is shown to best support true fully adaptive routing capability of deadlock recovery schemes while maximizing network performance (102 % higher throughput and 86 % lower network latency than other architectures). Therefore, this router architect...
Modeling the initial stage of a file sharing process on a BitTorrent network
In this paper, we model the number of seeders during the initial stage of a file sharing process on BitTorrent networks. The initial stage is crucial for successfully identifying the initial seeder, who provided the source of the files on the Internet. Most existing BT models focus on different parameters in the steady state, which occurs at a later stage of a file sharing process. None of them...