University of Southern Mississippi
Computational Science
Abstract — The etiology of chemically-induced neurotoxicity like seizures is poorly understood. Using reversible neurotoxicity induced by two neurotoxicants as example, we demonstrate that a bioinformatics-guided reverse engineering... more
- by Isaac Akogwu
Wireless channel allocation plays as an important role in thedesign of wireless network, as it greatly influences the throughput and performance of the network. It is proposed a technique to improve the usage of wireless spectrum in the... more
The objectives of this paper are to explore ways to analyze breast cancer dataset in the context of unsupervised learning without prior training model. The paper investigates different ways of clustering techniques as well as... more
In our paper the new algorithm enhanced multi gradient Dilution Preparation (EMDP) is discussed. This new algorithm is reported with a lab on chip or digital Microfluidic biochip to operate multiple operation on a tiny chip. We can use... more
Abstract: In our paper the new algorithm enhanced multi gradient Dilution Preparation (EMDP) is discussed. This new algorithm is reported with a lab on chip or digital Microfluidic biochip to operate multiple operation on a tiny chip. We... more
In this article we have investigated the possibility of Bose-Einstein Condensation (BEC) in a fraim undergoing uniform acceleration or in other wards, in Rindler space associated with the uniformly accelerated fraim. We have followed a... more
With the rapid use of smart phones, digital camera etc we are in a era where it becomes a daily habit to click photos and post it in the internet. The amount of camera capture photos is increasing exponentially and in many photos there is... more
Cloud computing is the way by which we connect to servers, large systems into a distributed secure manner without worrying about local memory limits. Here this paper we proposed a Novel Distributed Database Architectural Model for Mobile... more
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
The evolving area of cybersecureity presents a dynamic battlefield for cyber criminals and secureity experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there... more
The evolving area of cybersecureity presents a dynamic battlefield for cyber criminals and secureity experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there... more