Author of the publication

Identification of Hepatocellular Carcinoma-Related Genes with a Machine Learning and Network Analysis.

, , , , and . J. Comput. Biol., 22 (1): 63-71 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Multi-task Scheduling Based on SMS., , and . CSSE (5), page 1086-1089. IEEE Computer Society, (2008)978-0-7695-3336-0.Intelligent tractors: Review of online traction control process., , , , , , , , , and . Comput. Electron. Agric., (2020)Network closure, brokerage, and structural influence of journals: a longitudinal study of journal citation network in Internet research (2000-2010)., and . Scientometrics, 97 (3): 675-693 (2013)The divided communities of shared concerns: Mapping the intellectual structure of e-Health research in social science journals., , , and . Int. J. Medical Informatics, 84 (1): 24-35 (2015)The shock, the coping, the resilience: smartphone application use reveals Covid-19 lockdown effects on human behaviors., , , , , , , , and . EPJ Data Sci., 12 (1): 17 (December 2023)A method for constructing discrete exact solutions and application to quintic discrete nonlinear Schrödinger equation, and . Chaos, Solitons & Fractals, 33 (2): 642--652 (July 2007)Seismic sub-volume coherence and image synthesis., , , , and . FSKD, page 2787-2789. IEEE, (2012)EigenCrime: An Algorithm for Criminal Network Mining Based on Trusted Computing., , , and . GreenCom/iThings/CPScom, page 1325-1329. IEEE, (2013)An implementation of security mechanism in chip for industrial wireless networks., , and . ICOIN, page 265-270. IEEE, (2017)Comment: Need for Guidelines on Appropriate Screening Designs for Practitioners., , , and . Technometrics, 56 (1): 23-24 (2014)