Background: Selecting an appropriate similarity measurement method is crucial for obtaining biologically meaningful clustering modules. Commonly used measurement methods are insufficient in capturing the complexity of biological systems and fail to accurately represent their intricate interactions.
Objective: This study aimed to obtain biologically meaningful gene modules by using the clustering algorithm based on a similarity measurement method.
With the development of the Internet of Things (IoT), the use of UAV-based data collection systems has become a very popular research topic. This paper focuses on the energy consumption problem of this system. Genetic algorithms and swarm algorithms are effective approaches for solving this problem.
View Article and Find Full Text PDFExp Biol Med (Maywood)
February 2022
Plateau essential hypertension is a common chronic harmful disease of permanent residents in plateau areas. Studies have shown some single nucleotide polymorphisms (SNPs) associations with hypertension, but few have been verified in plateau area-lived people. In this paper, we examined some hypertension-related gene loci to analyze the relationship between risk SNPs and plateau essential hypertension in residents in Qinghai-Tibet plateau area.
View Article and Find Full Text PDFSensors (Basel)
March 2017
In order to ensure the reliability and credibility of the data in wireless sensor networks (WSNs), this paper proposes a trust evaluation model and data fusion mechanism based on trust. First of all, it gives the model structure. Then, the calculation rules of trust are given.
View Article and Find Full Text PDFSpecific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes.
View Article and Find Full Text PDF