Learn More
Heterozygous germline mutations of BMPR2 contribute to familial clustering of pulmonary arterial hypertension (PAH). To further explore the genetic basis of PAH in isolated cases, we undertook a candidate gene analysis to identify potentially deleterious variation. Members of the bone morphogenetic protein (BMP) pathway, namely SMAD1, SMAD4, SMAD5, and(More)
Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design security countermeasures, to choose between alternative security architectures, and to systematically modify security configurations in order to improve security. However, the security(More)
In order to create secure and dependable systems and information intelligence, it is a major challenge to determine the security level of the network. This security level depends on a number of dynamically changing factors including emerging of new vulnerabilities and threats, policy updates and network traffic. An effective means to address this is to(More)
Ubiquitin (Ub) is a vital regulatory component in various cellular processes, including cellular responses to viral infection. As obligate intracellular pathogens, viruses have the capacity to manipulate the ubiquitin (Ub) cycle to their advantage by encoding Ub-modifying proteins including deubiquitinases (DUBs). However, how cellular DUBs modulate(More)
Network security depends on a number of factors. And a common characteristic of these factors is that they are dynamic in nature. Such factors include new vulnerabilities and threats, the network policy structure and traffic. These factors can be divided into two broad categories. Network risk and service risk. As the name implies, the former one(More)
Text classification poses some specific challenges. One such challenge is its high dimensionality where each document (data point) contains only a small subset of them. In this paper, we propose Semi-supervised Impurity based Subspace Clustering (SISC) in conjunction with k-Nearest Neighbor approach, based on semi-supervised subspace clustering that(More)
Security of a network depends on a number of dynamically changing factors. These include emergence of new vulnerabilities and threats, policy structure and network traffic. Due to the dynamic nature of these factors, identifying security metrics that measure objectively the quality of security configuration pose a major challenge. Moreover, this evaluation(More)
BACKGROUND Graft-versus-host disease (GVHD) is the major limitation of allogeneic haemopoietic stem-cell transplantation (HSCT), for which no approved treatments are available. Use of mesenchymal stromal cells (MSCs) has become standard practice in some European countries, but controversy exists for their benefit. The aim of this meta-analysis was to(More)
There has been a lot of research targeting text classification. Many of them focus on a particular characteristic of text data-multi-labelity. This arises due to the fact that a document may be associated with multiple classes at the same time. The consequence of such a characteristic is the low performance of traditional binary or multi-class(More)
With the boom of web and social networking, the amount of generated text data has increased enormously. Much of this data can be considered and modeled as a stream and the volume of such data necessitates the application of automated text classification strategies. Although streaming data classification is not new, considering text data streams for(More)