Learn More
Proteomics is a field dedicated to the analysis and identification of proteins within an organism. Within proteomics, two-dimensional electrophoresis (2-DE) is currently unrivalled as a technique to separate and analyse proteins from tissue samples. The analysis of post-experimental data produced from this technique has been identified as an important step(More)
The Kohonen self-organising feature map (SOM) has several important properties that can be used within the data mining/knowledge discovery and exploratory data analysis process. A key characteristic of the SOM is its topology preserving ability to map a multi-dimensional input into a two-dimensional form. This feature is used for classification and(More)
Key Results: Differential Ratio data mining was used to perform knowledge discovery within the 2-DE proteomics data, incorporating the spatial and temporal components. How does the work advance the state-of-the-art?: Development of data mining technique that performs automatic discovery of interesting trends within large spatio-temporal data incorporating(More)
Spoken language engineering is starting to deliver technological products to the commercial market and has an important future role in supporting the multilingual structures of modern Europe. The field will be driven forward by basic science and applied research by experts drawn from a variety of backgrounds; among them: linguistics, psychology, computer(More)
The growth of biomedical databases has seen a demand for data mining techniques to efficiently and effectively analyse the data contained within. One important consideration is the need to include expert's opinions within the knowledge discovery process. However, this can be difficult to accomplish when such heuristics are presented in loosely defined,(More)
In this study, a novel model is proposed to predict perpetuators of some terrorist events which are remain unsolved. The CPM learns from similarities between terrorist attacks and their crime attributes then puts them in appropriate clusters. Solved and unsolved attacks are gathered in the same - all linked to each other - “umbrella” clusters;(More)
The working group in Computer-Aided Learning and Use of the Internet aims: q to bring together information about resources and tools for computer-aided learning (CAL) in the field q to promote the use of the Internet to disseminate information and teaching materials q to make suggestions of areas of resource development to potential authors q to encourage(More)