On a Reinforced Fuzzy Inclusion and Its Application to Database Querying

Author(s):  
Patrick Bosc ◽  
Olivier Pivert
Keyword(s):  
2019 ◽  
Vol 20 (22) ◽  
pp. 5594 ◽  
Author(s):  
Desterke ◽  
Chiappini

Nonalcoholic steatohepatitis (NASH) is becoming a public health problem worldwide. While the number of research studies on NASH progression rises every year, sometime their findings are controversial. To identify the most important and commonly described findings related to NASH progression, we used an original bioinformatics, integrative, text-mining approach that combines PubMed database querying and available gene expression omnibus dataset. We have identified a signature of 25 genes that are commonly found to be dysregulated during steatosis progression to NASH and cancer. These genes are implicated in lipid metabolism, insulin resistance, inflammation, and cancer. They are functionally connected, forming the basis necessary for steatosis progression to NASH and further progression to hepatocellular carcinoma (HCC). We also show that five of the identified genes have genome alterations present in HCC patients. The patients with these genes associated to genome alteration are associated with a poor prognosis. In conclusion, using an integrative literature- and data-mining approach, we have identified and described a canonical pathway underlying progression of NASH. Other parameters (e.g. polymorphisms) can be added to this pathway that also contribute to the progression of the disease to cancer. This work improved our understanding of the molecular basis of NASH progression and will help to develop new therapeutic approaches.


2005 ◽  
Vol 19 (1) ◽  
pp. 97-111 ◽  
Author(s):  
A. Faye Borthick ◽  
Donald R. Jones

In this case, students develop and use database queries to analyze possible causes of a potential budget overrun for telephone warranty service for a company that sells personal computers (PCs). Students query a Microsoft Access® database with tables for sales of PCs, estimates for technician time, employees, technician costs, and service minutes provided. The queries illustrate those that accountants could prepare to analyze transaction-level data to develop insights about business operations. Query-based approaches to analyzing transaction data are likely to become more common as businesses take advantage of the wealth of data available to them for solving business problems and exploiting emerging opportunities. This case is appropriate for students with rudimentary database querying proficiency, e.g., at the level developed by Borthick et al.'s (2001) case on assuring compliance for responses to website referrals.


Author(s):  
Kannan Balasubramanian ◽  
M. Rajakani

The Secure Multiparty computation is characterized by computation by a set of multiple parties each participating using the private input they have. There are different types of models for Secure Multiparty computation based on assumption about the type of adversaries each model is assumed to protect against including Malicious and Covert Adversaries. The model may also assume a trusted setup with either using a Public Key Infrastructure or a using a Common Reference String. Secure Multiparty Computation has a number of applications including Scientific Computation, Database Querying and Data Mining.


2021 ◽  
pp. 325-362
Author(s):  
Benjamin S. Baumer ◽  
Daniel T. Kaplan ◽  
Nicholas J. Horton
Keyword(s):  

2009 ◽  
Vol 160 (15) ◽  
pp. 2120-2140 ◽  
Author(s):  
Patrick Bosc ◽  
Olivier Pivert ◽  
Daniel Rocacher
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document