Browsing Department of Computer Science by Title
Now showing items 1-20 of 41
-
A Distribution-free Convolution Model for Background Correction of Oligonucleotide Microarray Data
(BMC Genomics, 2009-07-07)Introduction: Affymetrix GeneChip® high-density oligonucleotide arrays are widely used in biological and medical research because of production reproducibility, which facilitates the comparison of results between experiment ... -
A gene selection method for GeneChip array data with small sample sizes
(2010-07)In microarray experiments with small sample sizes, it is a challenge to estimate p-values accurately and decide cutoff p-values for gene selection appropriately. Although permutation-based methods have proved to have ... -
A Logic Approach to Granular computing
(International Journal of Cognitive Informatics and Natural Intelligence, 2008-04)Granular computing is an emerging field of study that attempts to formalize and explore methods and heuristics of human problem solving with multiple levels of granularity and abstraction. A fundamental issue of granular ... -
A new statistical approach to combining p-values using gamma distribution and its application to genome-wide association study
(BMC Bioinformatics, 2014-12-16)Background: Combining information from different studies is an important and useful practice in bioinformatics, including genome-wide association study, rare variant data analysis and other set-based analyses. Many statistical ... -
Android System Partition to Traffic Data?
(International Journal of Knowledge Engineering, 2017-12)The familiarity and prevalence of mobile devices inflates their use as instruments of crime. Law enforcement personnel and mobile forensics investigators, are constantly battling to gain the upper-hand at developing a ... -
Assessment of gene order computing methods for Alzheimer’s disease
(BMC Medical Genomics, 2013-01-23)Background: Computational genomics of Alzheimer disease (AD), the most common form of senile dementia, is a nascent field in AD research. The field includes AD gene clustering by computing gene order which generates higher ... -
Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices
(Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)The escalating integration of network-enabled medical devices raises concerns for both practitioners and academics in terms of introducing new vulnerabilities and attack vectors. This prompts the idea that combining medical ... -
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
(Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used ... -
A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices
(Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)The integration of medical devices in everyday life prompts the idea that these devices will increasingly have evidential value in civil and criminal proceedings. However, the investigation of these devices presents new ... -
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
(International Journal of Digital Crime and Forensics, 2012-04)Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying ... -
CDBFIP: Common Database Forensic Investigation Processes for Internet of Things
(IEEE Access, 2017-10)Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment. Although the concept of database forensics has been around for ... -
Cloud Forecasting: Legal Visibility Issues in Saturated Environments
(Computer Law & Security Review, 2018)The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ... -
Comparison of feature selection and classification for MALDI-MS data
(BMC Genomics, 2009-07-07)Introduction: In the classification of Mass Spectrometry (MS) proteomics data, peak detection, feature selection, and learning classifiers are critical to classification accuracy. To better understand which methods are ... -
A Comparison Study using Stegexpose for Steganalysis.
(International Journal of Knowledge Engineering, 2017-06)Steganography is the art of hiding secret message in innocent digital data files. Steganalysis aims to expose the existence of steganograms. While internet applications and social media has grown tremendously in recent ... -
Detecting Deception Using Machine Learning
(Proceedings of the 54th Hawaii International Conference on System Sciences, 2021-01)Today’s digital society creates an environment potentially conducive to the exchange of deceptive information. The dissemination of misleading information can have severe consequences on society. This research investigates ... -
Detecting Differentially Methylated Loci for Multiple Treatments Based on High-Throughput Methylation Data
(BMC Bioinformatics, 2014-05-15)Background: Because of its important effects, as an epigenetic factor, on gene expression and disease development, DNA methylation has drawn much attention from researchers. Detecting differentially methylated loci is ... -
Detecting Repackaged Android Applications Using Perceptual Hashing
(Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)The last decade has shown a steady rate of Android device dominance in market share and the emergence of hundreds of thousands of apps available to the public. Because of the ease of reverse engineering Android applications, ... -
Exploitation and Detection of a Malicious Mobile Application
(Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)Mobile devices are increasingly being embraced by both organizations and individuals in today’s society. Specifically, Android devices have been the prominent mobile device OS for several years. This continued amalgamation ... -
Feature Selection and Classification of MAQC-II Breast Cancer and Multiple Myeloma Microarray Gene Expression Data
(PLoS ONE, 2009-12-11)Microarray data has a high dimension of variables but available datasets usually have only a small number of samples, thereby making the study of such datasets interesting and challenging. In the task of analyzing microarray ... -
Gene selection and classification for cancer microarray data based on machine learning and similarity measures
(BMC Genomics, 2011)Background: Microarray data have a high dimension of variables and a small sample size. In microarray data analyses, two important issues are how to choose genes, which provide reliable and good prediction for disease ...