A probabilistic model for the evaluation of module extraction algorithms in complex biological networks
This thesis presents CiGRAM, a model of complex networks ith known modular structure that is capable of generating realistic graph topology. Much of the recent focus on module detection has been geared towards developing new algorithms capable of detecting biologically significant clusters. However...
| Main Author: | Gilbert, J.P. |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/30524/ |
Similar Items
From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks
by: Gilbert, James P., et al.
Published: (2018)
by: Gilbert, James P., et al.
Published: (2018)
Application of Markov Stability for graph-based clustering on protein-protein interaction networks
by: von Holy, Peter
Published: (2023)
by: von Holy, Peter
Published: (2023)
The identification of influential spreaders and communities in complex networks
by: Sun, Hong-Liang
Published: (2018)
by: Sun, Hong-Liang
Published: (2018)
An improved game-theoretic approach to uncover overlapping communities
by: Sun, Hong-Liang, et al.
Published: (2017)
by: Sun, Hong-Liang, et al.
Published: (2017)
Learning to rank salient objects using transformers and graph reasoning
by: Bowen, Deng
Published: (2025)
by: Bowen, Deng
Published: (2025)
A fast community detection method in bipartite networks by distance dynamics
by: Sun, Hong-Liang, et al.
Published: (2018)
by: Sun, Hong-Liang, et al.
Published: (2018)
A Dynamic Programming Algorithm for Reliable Network Design
by: Elshqeirat, Basima, et al.
Published: (2014)
by: Elshqeirat, Basima, et al.
Published: (2014)
A Practical Algorithm for Reliable Network Topology Design
by: Elshqeirat, B., et al.
Published: (2013)
by: Elshqeirat, B., et al.
Published: (2013)
A hybrid algorithm for finding shortest path in network routing.
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
Topology Design with Minimal Cost Subject to Network Reliability Constraint
by: Elshqeirat, Basima, et al.
Published: (2015)
by: Elshqeirat, Basima, et al.
Published: (2015)
Detecting collusive spamming activities in community question answering
by: Liu, Yuli, et al.
Published: (2017)
by: Liu, Yuli, et al.
Published: (2017)
Seismic data conditioning and neural network-based attribute selection for enhanced fault detection
by: Chehrazi, A., et al.
Published: (2013)
by: Chehrazi, A., et al.
Published: (2013)
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
by: Xie, Miao, et al.
Published: (2011)
by: Xie, Miao, et al.
Published: (2011)
Combinatorial Optimization of Topological Design in Computer Communication Network
by: Garba Mohammed, Salisu
Published: (2004)
by: Garba Mohammed, Salisu
Published: (2004)
Mapping multiplexing technique (MMT): a novel intensity modulated transmission format for high-speed optical communication systems
by: Mohamed Elsherif, Mohamed Assad Hashem
Published: (2016)
by: Mohamed Elsherif, Mohamed Assad Hashem
Published: (2016)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Complexity and biology: Edgar Morin and Henri Atlan
by: Marks, John
Published: (2016)
by: Marks, John
Published: (2016)
Dynamic Programming for Minimal Cost Topology with Two Terminal Reliability Constraint
by: Elshqeirat, B., et al.
Published: (2013)
by: Elshqeirat, B., et al.
Published: (2013)
Dynamic Programming for Minimal Cost Topology with Reliability Constraint
by: Elshqeirat, B., et al.
Published: (2013)
by: Elshqeirat, B., et al.
Published: (2013)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Detection and analysis of series arc failure in DC power distribution systems
by: Seeley, Danny
Published: (2025)
by: Seeley, Danny
Published: (2025)
Bi-Objective Network Topology Design with Reliability Constraint
by: Elshqeirat, Basima, et al.
Published: (2015)
by: Elshqeirat, Basima, et al.
Published: (2015)
Magnetoencephalographic dynamics and adaptive brain networks across multiple timescales
by: Mandke, Kanad
Published: (2020)
by: Mandke, Kanad
Published: (2020)
Iterative group-based and difference ranking method for online rating systems with spamming attacks
by: Fu, Quan-Yun, et al.
Published: (2021)
by: Fu, Quan-Yun, et al.
Published: (2021)
Artcode detection in images
by: Xu, Liming
Published: (2020)
by: Xu, Liming
Published: (2020)
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Prevalence and genotypic characterization of antibiotic-resistant salmonella isolated from dogs, cats and snakes in Klang Valley, Malaysia
by: Abathcha, Mustapha Goni
Published: (2014)
by: Abathcha, Mustapha Goni
Published: (2014)
Near consensus complex linear and nonlinear social networks
by: Ling, B., et al.
Published: (2014)
by: Ling, B., et al.
Published: (2014)
Provenance network analytics: an approach to data analytics using data provenance
by: Huynh, Trung Dong, et al.
Published: (2018)
by: Huynh, Trung Dong, et al.
Published: (2018)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
Computation of three topological indices on some molecular graphs and families of nanostar dendrimers
by: Haoer, Raad Sehen
Published: (2018)
by: Haoer, Raad Sehen
Published: (2018)
Comparing multilayer brain networks between groups: Introducing graph metrics and recommendations
by: Mandke, Kanad, et al.
Published: (2018)
by: Mandke, Kanad, et al.
Published: (2018)
Detecting Asset Cascading Failures Using Complex Network Analysis
by: Moffatt, J., et al.
Published: (2021)
by: Moffatt, J., et al.
Published: (2021)
On conditional random fields: applications, feature selection, parameter estimation and hierarchical modelling
by: Tran, The Truyen
Published: (2008)
by: Tran, The Truyen
Published: (2008)
A study on decision-making of food supply chain based on big data
by: Ji, Guojun, et al.
Published: (2017)
by: Ji, Guojun, et al.
Published: (2017)
Genetic algorithm-based pore network extraction from micro-computed tomography images
by: Ebrahimi, A., et al.
Published: (2013)
by: Ebrahimi, A., et al.
Published: (2013)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
An Immunology-inspired Multi-engine Anomaly Detection System with Hybrid Particle Swarm Optimisations
by: Jiang, F., et al.
Published: (2012)
by: Jiang, F., et al.
Published: (2012)
Similar Items
-
From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks
by: Gilbert, James P., et al.
Published: (2018) -
Application of Markov Stability for graph-based clustering on protein-protein interaction networks
by: von Holy, Peter
Published: (2023) -
The identification of influential spreaders and communities in complex networks
by: Sun, Hong-Liang
Published: (2018) -
An improved game-theoretic approach to uncover overlapping communities
by: Sun, Hong-Liang, et al.
Published: (2017) -
Learning to rank salient objects using transformers and graph reasoning
by: Bowen, Deng
Published: (2025)