Microarray Missing Values Imputation Methods: Critical Analysis Review
Mou'ath Hourani, Ibrahiem M. M. El Emary (2009)
Computer Science and Information Systems
Similarity:
Mou'ath Hourani, Ibrahiem M. M. El Emary (2009)
Computer Science and Information Systems
Similarity:
Antonio Ciampi, Ana González Marcos, Manuel Castejón Limas (2005)
SORT
Similarity:
Correspondence analysis followed by clustering of both rows and columns of a data matrix is proposed as an approach to two-way clustering. The novelty of this contribution consists of: i) proposing a simple method for the selecting of the number of axes; ii) visualizing the data matrix as is done in micro-array analysis; iii) enhancing this representation by emphasizing those variables and those individuals which are 'well represented' in the subspace of the chosen axes. The approach...
Áurea Sousa, Helena Bacelar-Nicolau, Fernando C. Nicolau, Osvaldo Silva (2013)
Biometrical Letters
Similarity:
In this paper, we illustrate an application of Ascendant Hierarchical Cluster Analysis (AHCA) to complex data taken from the literature (interval data), based on the standardized weighted generalized affinity coefficient, by the method of Wald and Wolfowitz. The probabilistic aggregation criteria used belong to a parametric family of methods under the probabilistic approach of AHCA, named VL methodology. Finally, we compare the results achieved using our approach with those obtained...
José Gouweleeuw, Peter Kooiman, Leon Willenborg, Peter-Paul De Wolf (1998)
Qüestiió
Similarity:
This paper describes the Post Randomisation Method (PRAM) for disclosure protection of microdata. Applying PRAM means that for each record in the data file according to a specified probability mechanism the score on a number of variables is changed. Since this probability mechanism is known, the characteristics of the latent true data can unbiasedly be estimated from the observed data moments in the perturbed file. PRAM is applied to categorical variables. It is shown that...
Maciej Falkowski, Czesław Jędrzejek (2009)
Control and Cybernetics
Similarity:
Tomasz Górecki, Maciej Łuczak (2013)
International Journal of Applied Mathematics and Computer Science
Similarity:
The Linear Discriminant Analysis (LDA) technique is an important and well-developed area of classification, and to date many linear (and also nonlinear) discrimination methods have been put forward. A complication in applying LDA to real data occurs when the number of features exceeds that of observations. In this case, the covariance estimates do not have full rank, and thus cannot be inverted. There are a number of ways to deal with this problem. In this paper, we propose improving...
Ch. Aswani Kumar (2009)
Computer Science and Information Systems
Similarity:
Krzysztof Simek (2003)
International Journal of Applied Mathematics and Computer Science
Similarity:
Recently, data on multiple gene expression at sequential time points were analyzed using the Singular Value Decomposition (SVD) as a means to capture dominant trends, called characteristic modes, followed by the fitting of a linear discrete-time dynamical system in which the expression values at a given time point are linear combinations of the values at a previous time point. We attempt to address several aspects of the method. To obtain the model, we formulate a nonlinear optimization...
Kevorchian, Cristian, Modan, Laurenţiu (2005)
Acta Universitatis Apulensis. Mathematics - Informatics
Similarity: