Search results for "NETWORKS"
showing 10 items of 3260 documents
Novel Version of PageRank, CheiRank and 2DRank for Wikipedia in Multilingual Network Using Social Impact
2020
International audience; Nowadays, information describing navigation behaviour of internet users are used in several fields, e-commerce, economy, sociology and data science. Such information can be extracted from different knowledge bases, including business-oriented ones. In this paper, we propose a new model for the PageRank, CheiRank and 2DRank algorithm based on the use of clickstream and pageviews data in the google matrix construction. We used data from Wikipedia and analysed links between over 20 million articles from 11 language editions. We extracted over 1.4 billion source-destination pairs of articles from SQL dumps and more than 700 million pairs from XML dumps. Additionally, we …
Inverse simulated annealing for the determination of amorphous structures
2013
We present a new and efficient optimization method to determine the structure of disordered systems in agreement with available experimental data. Our approach permits the application of accurate electronic structure calculations within the structure optimization. The new technique is demonstrated within density functional theory by the calculation of a model of amorphous carbon.
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks
2022
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The la…
Non-exponential relaxation in disordered materials: Phenomenological correlations and spectrally selective experiments
1998
Abstract In most glass-forming materials external perturbations are relaxed in a non-exponential fashion. It is shown that the degree of non-exponentiality is phenomenologically correlated with the departure from simple thermally activated behavior as measured by the fragility index m. In model glass formers such as the Ge-As-Se ternary alloy, and to some degree for amorphous materials in general, the correlations with these properties are observed also for other characteristic features. These include the specific heat step and the aging kinetics in the glass transformation range. While phenomenological correlations have proven very useful for rationalizing the properties of many glass form…
Childhood Adversities and Adult Headache in Poland and Germany.
2015
Objective Various childhood adversities have been found to be associated with chronic pain in adulthood. However, associations were moderate in most studies, i.e. odds ratios (OR) were between one and two. Method An internet survey was performed in 508 Polish and 500 German subjects. A total of 19 childhood adversities were selected and their associations with headaches explored. Age, gender and country were included as potential confounders, as well as their two-way interaction with the risk factors. Results Two strong risk factors were identified. (1) A combined score for physical and emotional neglect showed an odds ratio (OR) of 2.78 (p < .002) to the frequency of headache in adulthood …
Guanxi and social capital: Networking among women managers in China and Finland
2014
Considering that women are still under-represented in management, researchers have claimed that networking is an important career management tool for women. This study aims to empirically explore how women managers benefit from social networks in the information technology (IT) field in China and Finland. Guanxi, an Eastern term for social networking, has seldom been studied in terms of gender and career, especially within cross-cultural research. Social capital is a Western term for social networks. Using questionnaires, in-depth interviews and interpretive analysis, we compare the composition and structure of social networks used by women managers within the information technology sector …
Wireless MAC processors: programming MAC protocols on commodity hardware
2012
Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…
Topological structure analysis of chromatin interaction networks.
2019
Abstract Background Current Hi-C technologies for chromosome conformation capture allow to understand a broad spectrum of functional interactions between genome elements. Although significant progress has been made into analysis of Hi-C data to identify biologically significant features, many questions still remain open, in particular regarding potential biological significance of various topological features that are characteristic for chromatin interaction networks. Results It has been previously observed that promoter capture Hi-C (PCHi-C) interaction networks tend to separate easily into well-defined connected components that can be related to certain biological functionality, however, …
Reverse engineering a mouse embryonic stem cell-specific transcriptional network reveals a new modulator of neuronal differentiation
2012
Gene expression profiles can be used to infer previously unknown transcriptional regulatory interaction among thousands of genes, via systems biology 'reverse engineering' approaches. We 'reverse engineered' an embryonic stem (ES)-specific transcriptional network from 171 gene expression profiles, measured in ES cells, to identify master regulators of gene expression ('hubs'). We discovered that E130012A19Rik (E13), highly expressed in mouse ES cells as compared with differentiated cells, was a central 'hub' of the network. We demonstrated that E13 is a protein-coding gene implicated in regulating the commitment towards the different neuronal subtypes and glia cells. The overexpression and …
Maternal Oct-4 is a potential key regulator of the developmental competence of mouse oocytes
2008
Abstract Background The maternal contribution of transcripts and proteins supplied to the zygote is crucial for the progression from a gametic to an embryonic control of preimplantation development. Here we compared the transcriptional profiles of two types of mouse MII oocytes, one which is developmentally competent (MIISN oocyte), the other that ceases development at the 2-cell stage (MIINSN oocyte), with the aim of identifying genes and gene expression networks whose misregulated expression would contribute to a reduced developmental competence. Results We report that: 1) the transcription factor Oct-4 is absent in MIINSN oocytes, accounting for 2) the down-regulation of Stella, a matern…