The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
Displaying 81 –
100 of
205
A method of combining three analytic techniques including regression rule induction, the k-nearest neighbors method and time series forecasting by means of the ARIMA methodology is presented. A decrease in the forecasting error while solving problems that concern natural hazards and machinery monitoring in coal mines was the main objective of the combined application of these techniques. The M5 algorithm was applied as a basic method of developing prediction models. In spite of an intensive development...
This paper demonstrates the development of a simple model of carbon flow during plant growth. The model was developed by six undergraduate students and their instructor as a project in a plant ecophysiology course. The paper describes the structure of the model including the equations that were used to implement it in Excel®, the plant growth experiments that were conducted to obtain information for parameterizing and testing the model, model performance, student responses to the modeling project,...
When invading the tissue, malignant tumour cells (i.e. cancer cells) need to detach from
neighbouring cells, degrade the basement membrane, and migrate through the extracellular
matrix. These processes require loss of cell-cell adhesion and enhancement of cell-matrix
adhesion. In this paper we present a mathematical model of an intracellular pathway for
the interactions between a cancer cell and the extracellular matrix. Cancer cells use
similar...
In the case of linear dynamics, repetitive processes are a distinct class of 2D linear systems with uses in areas ranging from long-wall coal cutting and metal rolling operations to iterative learning control schemes. The main feature which makes them distinct from other classes of 2D linear systems is that information propagation in one of the two independent directions only occurs over a finite duration. This, in turn, means that a distinct systems theory must be developed for them for onward...
Many real world data and processes have a network structure and can usefully be represented as graphs. Network analysis focuses on the relations among the nodes exploring the properties of each network. We introduce a method for measuring the strength of the relationship between two nodes of a network and for their ranking. This method is applicable to all kinds of networks, including directed and weighted networks. The approach extracts dependency relations among the network's nodes from the structure...
Recent advances in technology have enabled the development of low cost, low power and multi functional wireless sensing devices. These devices are networked through setting up a Wireless Sensor Network (WSN). Sensors that form a WSN are expected to be remotely deployed in large numbers and to self-organize to perform distributed sensing and acting tasks. WSNs are growing rapidly in both size and complexity, and it is becoming increasingly difficult to develop and investigate such large and complex...
The immune system is able to protect the host from tumor onset, and immune deficiencies
are accompanied by an increased risk of cancer. Immunology is one of the fields in biology
where the role of computational and mathematical modeling and analysis were recognized the
earliest, beginning from 60s of the last century. We introduce the two most common methods
in simulating the competition among the immune system, cancers and tumor immunology
strategies:...
Electro-muscular disruption (EMD) devices such as TASER M26 and
X26 have been used as a less-than-lethal weapon. Such EMD devices
shoot a pair of darts toward an intended target to generate an
incapacitating electrical shock. In the use of the EMD device,
there have been controversial questions about its safety and
effectiveness. To address these questions, we need to investigate
the distribution of the current density J inside the target
produced by the EMD device. One approach is to develop a
computational...
In this article, we analyse the process of the emergence of RNA polynucleotides located in an enclosed environment, at an early stage of the RNA world. Therefore we prepared a mathematical model, composed of a set of differential equations, which simulates the behaviour of an early biological system bounded by a protocell membrane. There is evidence that enclosed environments were available on the primordial Earth. There are also experimental proofs that RNA strands can develop in these formations....
Many tumours undergo periods in which
they apparently do not grow but remain at a roughly constant size
for extended periods. This is termed tumour dormancy. The
mechanisms responsible for dormancy include failure to develop an
internal blood supply, individual tumour cells exiting the cell
cycle and a balance between the tumour and the immune response to
it. Tumour dormancy is of considerable importance in the natural
history of cancer. In many cancers, and in particular in breast
cancer, recurrence...
Currently displaying 81 –
100 of
205