Literature DB >> 30046299

An Extreme Learning Machine Based on Artificial Immune System.

Hui-Yuan Tian1, Shi-Jian Li1, Tian-Qi Wu1, Min Yao1.   

Abstract

Extreme learning machine algorithm proposed in recent years has been widely used in many fields due to its fast training speed and good generalization performance. Unlike the traditional neural network, the ELM algorithm greatly improves the training speed by randomly generating the relevant parameters of the input layer and the hidden layer. However, due to the randomly generated parameters, some generated "bad" parameters may be introduced to bring negative effect on the final generalization ability. To overcome such drawback, this paper combines the artificial immune system (AIS) with ELM, namely, AIS-ELM. With the help of AIS's global search and good convergence, the randomly generated parameters of ELM are optimized effectively and efficiently to achieve a better generalization performance. To evaluate the performance of AIS-ELM, this paper compares it with relevant algorithms on several benchmark datasets. The experimental results reveal that our proposed algorithm can always achieve superior performance.

Entities:  

Mesh:

Year:  2018        PMID: 30046299      PMCID: PMC6036855          DOI: 10.1155/2018/3635845

Source DB:  PubMed          Journal:  Comput Intell Neurosci


1. Introduction

In recent years, many computational intelligence techniques, such as neural networks and support vector machines (SVMs) [1], have been widely used in many real-world applications. However, those algorithms face some defects such as slow learning speed, trivial human intervention, and poor computational scalability. Recently, to solve the drawbacks mentioned above, Huang et al. [2-5] proposed a new method named extreme learning machine (ELM) which has attracted ever-growing research attention. In contrast to the traditional neural networks such as BP [6], ELM is a tuning-free algorithm with fast learning speed by randomly generating input weights and hidden biases. With the help of least square method and Moore-Penrose generalized inverse, the ELM is transferred as a linear learning system. In addition, ELM is theoretically proved to have a good generalization performance with least human intervention. Therefore, ELM is widely used in many fields [5]. For example, Chaturvedi et al. [7] extended the extreme learning machine (ELM) paradigm to a novel framework that exploits the features of both Bayesian networks and fuzzy recurrent neural networks to perform subjectivity detection. Gastaldo et al. [8] addressed the specific role played by feature mapping in ELM. Cambria et al. [9] explored how the high generalization performance, low computational complexity, and fast learning speed of extreme learning machines can be exploited to perform analogical reasoning in a vector space model of affective common-sense knowledge. Recently Ragusa et al. [10] tackled the implementation of single hidden layer feedforward neural networks (SLFNs), based on hard-limit activation functions, on reconfigurable devices. It is known that an appropriate selection of initial weight sets is very vital for training a neural network model [11]. There is a strong correlation between the final solution and the initial weight. However, due to the random determination of some learning parameters, some nonoptimal parameter may be introduced to the model [5], which may put negative impact on the final performance. To solve such a drawback, many relative works have been proposed in the past ten years. A straightforward way is to combine evolutionary methods with ELM [12]. For instance, Zhu et al. [13] utilized differential evolutionary algorithm (DE) to optimize ELM's generated parameters to achieve better performance. In [14], Xue et al. combined genetic algorithm (GA), ELM, and ensemble learning to get a better and stable result. Rather than using GA or DE method, Sarasw athi et al. presented a PSO driven ELM [15], combining with Integer Coded Genetic Algorithm (ICGA) to solve gene selection and cancer classification. In [16], Cao et al. proposed an improved learning algorithm named self-adaptive evolutionary extreme learning machine (SaE-ELM). Similarly, Wu et al. presented a novel algorithm named dolphin swarm algorithm extreme learning machine (DSA-ELM) [17] to solve optimization problems. However, all the above evolutionary algorithms have different search efficiency to optimize the problem. There is still much space to improve. For example, it is one of the biggest challenges in ELM that some nonoptimal parameters may be introduced to ELM algorithm due to the random generation of parameters. To overcome that challenge, in this paper we propose a new extreme method named artificial immune system extreme learning machine (AIS-ELM). Because artificial immune system (AIS) [18-20] has global search ability [21] and good convergence [22], it can solve some difficulties like slow convergence, getting stuck in local minima, etc. Therefore, we use AIS to optimize ELM to get a better initial weight sets capable of avoiding the training process falling into the local optimum. The original version and preliminary results of this paper's method were proposed by us in ELM2017 [23]. In this paper we have revised the original formulas, compared the AIS-ELM with more algorithms and added new expressions, regression validation and more datasets. The rest of the paper is arranged as follows. Sections 2 and 3 briefly describe the traditional ELM and AIS methods. Section 4 proposes the detailed description of AIS-ELM. Section 5 carries out corresponding experiment: AIS-ELM algorithm is compared with traditional ELM, PSO-ELM, SaE-ELM, and DSA-ELM on five regression problems and eight classification benchmark problems obtained from the UCI Machine Learning Repository [24]; the training times between AIS-ELM and BP and SVM and traditional ELM are compared on three benchmark classification problems. The last section gives a conclusion of this paper.

2. Extreme Learning Machine

This section will introduce the extreme learning machine [2-5] proposed by Professor Huang. ELM is developed from a single hidden layer feedforward network and is extended to a generalized single hidden layer feedforward network. Compared to other conventional learning algorithms, the extreme learning algorithm's advantage is that the nodes of the single hidden layer feedforward network need not be adjusted. Compared with the traditional learning algorithm, the extreme learning machine not only has the smaller error but can reach the smallest norm of weights [5]; because the hidden layer need not to be adjusted in the limit learning machine algorithm, the output weight matrix can be solved by the least squares method. For N arbitrary training samples {(x, t)}, where x = [x, x,…, xin] ∈ Rn and t = [t, t,…, t] ∈ R, and given activation function g(x), the standard mathematical model of SLFNs with hidden nodes is modeled as follows:where w = [w, w,…w] is the weight vector connecting the input neurons and ith hidden neuron, β = [β, β,…β] is the weight vector connecting the ith  hidden neuron and the output neurons, and b is the threshold of the ith hidden neuron. That standard SLFNs with hidden neurons given activation function g(x) can approximate these N samples with zero error which means thatThere exist β, w, and b such thatThe above N equations can be written compactly aswhereHere, H is called the hidden layer output matrix [3].The column of H is the ith hidden node's output vector with respect to inputs x1, x2,…x and the jth row of H is the output vector of the hidden layer with respect to x. Then the vector β (connecting the hidden layer with the output layer) is estimated using the Moore-Penrose generalized inverse of the matrix H: ELM algorithm can be summarized as shown in Algorithm 1.
Algorithm 1

Standard ELM.

3. Artificial Immune System

A relatively new area of bioinspired computing is Artificial Immune Systems (AIS). It is inspired by biological models of the natural immune system which has the properties of diversity, distributed computation, dynamic learning, error tolerance, adaptation, and self-monitoring. AIS can be applied to many domains [19] in principle for the reason that it is a general framework for a distributed adaptive system. This section will introduce the AIS in three aspects. Firstly, the clonal selection algorithm is briefly described in Section 3.1. Secondly, Section 3.2 introduces the mathematical model of BCA. Finally, the mathematical model describing the interaction of Antigen-Antibody is represented in Section 3.3.

3.1. Mathematical Model of BCA

Each B cell is modeled as binary strings of fixed length l for simplicity of calculation. One of the most important design choices in developing an Artificial Immune Systems algorithm is similarity measure or matching rule [25], and it is closely coupled to the encoding scheme. Hamming distance and edit distance are the obvious approximate matching rules. However, there is a more immunologically plausible rule, called r-contiguous bits [26]: two strings will match if they have r-contiguous bits in common (see Figure 1). The value r is a threshold which serves as indication of the size of the subset of strings that a single string can match. For example, if r = l, the matching is completely special; i.e., the string will match only a single string (itself), but if r = 0, the matching is absolutely general; that is, the string will match every single string of length l.
Figure 1

Matching under the rule of r-contiguous bits. In this example, r = 5, so the left is matching while the right is not.

Besides, in the algorithm a contiguous region hypermutation operator [27] is used and its form iswhere f is the probability of transition from zero to some number T  (0 ≤ T ≤ 2 − 1); L is the length of the binary string; a is the bit position of the first “flip” bit starting from the most significant bit; b is the bit position of the last “flip” bit starting from the most significant bit; k is the number of bits that must be flipped to mutate from 0 to T. r is the mutation probability of a bit given a contiguous region. {L, a, b, k, T} ∈ ℤ+; 0 ≤ T ≤ 2 − 1; a ≤ b ≤ L; {f, r} ∈ ℝ; 0 ≤ r ≤ 1

3.2. Clonal Selection Theory

The clonal selection theory (CST) [28] is used to explain how the adaptive immune system responds to an antigenic stimulus basically. It establishes the theory that only cells that are capable of recognizing an antigen will proliferate, while those that are incapable of doing so will be eliminated. Both T cells and B cells can operate clonal selection. In the case of B cells, when the antigen receptors bind with an antigen, B cells begin to clone themselves and undergo somatic hypermutation to introduce diversity into the B cell population. After that B cells become activated and differentiate into plasma or memory cells. Plasma cells produce numerous antigen-specific antibodies leading to the removal of the antigen in a successful immune response. Memory cells remain within the host and promote a rapid secondary response when encountering the same (or similar) antigen. This is the operation of acquired immunity [19]. The B Cell Algorithm (BCA) as a simple clonal selection method was introduced in [22]. An outline of BCA is shown in Algorithm 2.
Algorithm 2

B cell algorithm.

3.3. Shape Space

An abstract model describing the interaction of Antigen-Antibody is introduced by Perelson & Oster [29]. In this model, it is assumed that the characteristics of the antibody receptor (combined region) associated with antigen binding can be described by specifying a total of L shape parameters. It is also assumed that the same L parameters can be used to describe the antigen. These L parameters are incorporated into the vector, and the antibody receptor and antigenic determinant are described as Ab and Ag points, respectively, in an L–Euclidean shape space. Each molecule can be considered as a point in the L-dimensional real space mathematically and the affinity of Ag-Ab is related to the reciprocal of the Euclidean distance between them. It is assumed that the antibody is capable of binding to any antigenic complement in the distance ε (stimulus region). Each N dimensional ball of radius ε takes up a volume cε, where c is a constant which depends upon the dimensionality of N (for arbitrary N, c = 2π/NΓ(N/2), where Γ(·) is the Gamma function). If there are a total of N antibodies, its total coverage volume would not be greater than Ncε since balls would overlap. Let us assume V is an n-dimensional cube with edge length R. The total volume of V is then R. The goal is to maximize the coverage of antibody which can make the immune approach more reliable. Then the following equation must come into existence:Therefore, the range of N is as follows:where 0 < ε < 1.

4. Proposed Extreme Learning Machine Based on Artificial Immune System

This section proposes an Extreme learning machine based on artificial immune system, namely, AIS-ELM. Traditional ELM algorithm randomly generates input weights and hidden biases, and among them there may be some sets of nonoptimal input weights and hidden biases. It is necessary to optimize these nonoptimal input weights and hidden biases. Two methods can be used to solve this problem. One is to increase hidden neurons which is time-consuming and may not get a good result. The other is to optimize the input weights and hidden biases. This paper combines AIS with ELM to optimize the input weights and hidden biases. AIS-ELM has three main phases: clone phase, mutation phase, and substitution phase. After the three phases, an optimal antibody will be produced. And the performance of ELM will be improved if the optimal antibody is used as the input weights and hidden biases. One set of input weights and hidden biases are modeled by an antibody; the ith antibody is represented by where i = 1,2,…N, N is the number of training data and the number of population members. is the number of hidden nodes and n is the dimension of input samples. a(j = 1,2,…, n) are the input weights. b are the hidden biases. The initial values of a and b are randomly generated within the range of [-1,1]. Then we calculate each antibody's fitness Fit(i = 1,2,…, N) according to the following equation with the validation data {(x, t)}.where T = [t1, t2,…,t] is the validation data. The reason for using validation data instead of training data is to alleviate possible overfitting. The corresponding output weights β are computed by using the MP generalized inverse by (7). The clone section creates a clone pool having N-1 clonal antibodies Ac(j = 1,2,…, N-1) for every antibody b, and each clonal antibody is identical to the original antibody, i.e., Ac = Ab  (j = 1,2,…, N-1). In the mutation procedure, each clonal antibody Ac in the clone pool is mutated by the following formula:where j = 1,2,…, N-1 and P is the mutation probability of the clonal antibody.Where the following holds. (1) (−1) · j avoids the situation in which the directions of mutation are the same and the result falls into local optimal. (2) f′ is as follows:The above equation is an application of (8), where N′ is the total elements of the antibody and ; f′ is the probability of transition from zero to some number T  (0 ≤ T ≤ 2 − 1); a is the bit position of the first “on” bit starting from the most significant bit; b is the bit position of the last “on” bit starting from the most significant bit; k is the number of bits that must be flipped to mutate from 0 to T; r is the mutation probability of a bit given a contiguous region. (3) Fit is used to adjust the range of mutation. The smaller the value of fitness is, the smaller the error is, so the requirement of mutation changes is tinier. On the other hand, the greater the value of fitness is, the bigger the need for mutation changes will be. (4) ε  (0 < ε < 1) is stimulus region in which the antibody is capable of binding to any antigenic complement [29]. The substitution phase is to calculate each clonal antibody's fitness Fit(j = 1,2,…, N-1) in the clone pool, and to compare Fit with the cloned antibody's fitness Fit. If Fit is smaller than Fit, corresponding fitness and antibody will be replaced. For instance, if i = 1, j = 1, and Fit < Fit, it is necessary to replace Ab1 and Fit with Ac11 and Fit. After this iterative process, the antibody population evolves forward global optimization. Then an antibody with minimal fitness which indicates smallest error is the optimal antibody. In the above process, our algorithm uses the clonal selection principle to ensure diversity which has been proved by De Castro et al. [30]. In addition, the ELM is optimized by BCA to get a better convergence which has been proved by Clark et al. [22] through an exact Markov chain model. Besides, using Fit to adjust the mutation matches up the theory of immune network. Last but not least, the requirement of shape space is also satisfied. In the specific experiment process, a number of other algorithms have to be compared, so the input data z should be normalized to ensure fairness.Then the stop criterion is as follows:where is the mean of the group of z. All in all, the AIS-ELM have three parts. The first part is initialization including input data, normalization, and set parameters. The second part applies AIS to ELM. After cloning, mutation, and substitution phase, an optimal antibody meeting the requirements is acquired. Then the antibody can be used as the input weights and hidden biases in ELM. The AIS-ELM is presented in Algorithm 3.
Algorithm 3

Artificial immune system extreme learning machine.

5. Performance Verification

In this section, AIS-ELM is compared with DS-ELM, PSO-ELM, SaE-ELM, traditional ELM, SVM, and BP. The experiments are divided into two parts. In the first part, the first five algorithms are tested on eight benchmark classification problems; next we compare AIS-ELM with SVM, BP, and traditional ELM on training time on three benchmark classification problems. In the second part, five benchmark regression problems are carried out. The experimental environment is MATLAB R2014b running on a windows pc with Intel 2.7 GHz CPU and 8GB RAM. All the inputs have been normalized into the range [-1,1] for fairness. The number of hidden neurons depends on different problems and it will be listed in specific experiment. Besides, the parameters for AIS-ELM are set as follows: a = 10, b = 50, ε = 0.1, k = 5, r = 0.2.

5.1. Classification

In this subsection, five algorithms' performances on eight benchmark classification problems are evaluated. The eight datasets are Ecoli, Pima Indians Diabetes (Diabetes), Epileptic Seizure, Iris, Heart Disease, Glass Identification (Glass), Image Segmentation (Image), and Statlog (Satellite), respectively. The detailed description of the eight datasets is listed in Table 1.
Table 1

Detailed description of the eight benchmark classification datasets

DatasetDataAttributesClasses
TrainingValidationTesting
Ecoli180787878
Diabetes3842219282
Epileptic Seizure6000275027501795
Heart Disease1507676755
Iris70404043
Glass100575797
Image1200555555197
Satellite343515001500367
Attributes of all the dataset have been normalized to [-1, 1], and the output is the training time, testing accuracy's mean and variance. A 20-fold cross validation method is taken to get the average of 20 repeated experiments to minimize the error. The whole dataset is divided into training set, validation set, and testing set without overlap. And the three sets are kept coincident for each trial of the five algorithms. The results are shown in Table 2, and the best results are emphasized in bold font.
Table 2

Results of the five algorithms on eight benchmark classification datasets.

DatasetAlgorithmTrainingTesting Accuracy (%)Hidden
Time (s)MeansStDevNodes
EcoliAIS-ELM2.232 87.087 1.32 20
DS-ELM2.52386.3521.4320
PSO-ELM2.25786.6231.6720
SaE-ELM2.60885.9851.7820
ELM0.00384.6782.1230
DiabetesAIS-ELM2.865 82.771 0.6720
DS-ELM3.19280.6670.6520
PSO-ELM3.99380.123 0.53 20
SaE-ELM4.21681.6730.7620
ELM0.00478.9841.2130
EpilepticAIS-ELM80.379 83.412 0.78 150
DS-ELM82.45882.3450.95150
PSO-ELM84.91281.6271.12150
SaE-ELM84.23381.7651.05150
ELM3.97680.0261.21180
Heart DiseaseAIS-ELM10.923 80.234 1.53 20
DS-ELM11.32979.6371.5620
PSO-ELM10.99378.9421.7320
SaE-ELM12.26578.7621.6920
ELM0.01376.1491,9630
IrisAIS-ELM1.0835 96.921 0.35 20
DS-ELM1.25596.4880.6920
PSO-ELM1.131596.1240.8320
SaE-ELM1.36295.6420.7420
ELM0.00193.4391.2630
GlassAIS-ELM2.632 68.453 1.67 20
DS-ELM3.02665.3451.8920
PSO-ELM3.06765.4381.9120
SaE-ELM3.03665.0872.2320
ELM0.00360.2672.1230
ImageAIS-ELM29.221 94.55 0.65990
DS-ELM31.97693.78 0.528 90
PSO-ELM32.10393.231.01490
SaE-ELM32.64192.110.83290
ELM0.049392.560.783120
SatelliteAIS-ELM37.424 88.346 0.87 100
DS-ELM39.85687.2650.97100
PSO-ELM39.61386.7951.08100
SaE-ELM40.23886.7150.96100
ELM0.062485.0280.99150
Considering the training time, it is obvious that ELM is the fastest one because all the other four algorithms transfer ELM repeatedly. Besides, AIS-ELM's training time is slightly shorter than the other three methods because the times of ELM iteration are smaller than other three algorithms. Then, focusing on the testing accuracy, it is easy to find that AIS-ELM has the highest mean testing accuracy in all the classification datasets. As for variance, AIS-ELM is the smallest in most instances and is slightly worse than the best one in a few cases. In addition, the good convergence property of clone selection algorithm shows that AIS-ELM outperforms the DSA-ELM, PSO-ELM, SaE-ELM, and ELM. In addition, we have done the Wilcoxon's signed-rank test [31], and the W-value is 0, which is less than the critical value at p<=0.05. Therefore, the results show that AIS-ELM is significantly different from DS-ELM, PSO-ELM, SaE-ELM, and ELM, which indicates that AIS-ELM outperforms the other four approaches on eight classification datasets. Besides, we compare the training time between AIS-ELM and BP, SVM, and traditional ELM on three benchmark classification problems. The results are shown in Table 3.
Table 3

Results of the four algorithms on three benchmark classification datasets.

AlgorithmSatelliteImageEpileptic Seizure
Training Times (s)Training Times (s)Training Times (s)
AIS-ELM37.42429.22180.379
SVM129.235103.496339.648
BP67.32958.637186.247
ELM0.06240.04933.976
From Table 3, although AIS-ELM is slower than traditional ELM because of iterations, its training speed is significantly faster than that of BP and SVM.

5.2. Regression

In this subsection, the five algorithms are compared on the five regression benchmark problems. The five datasets are Breast Cancer, Parkinson, SinC, Servo, and Yacht Hydro (Yacht), respectively. Detailed description of the five datasets is shown in Table 4.
Table 4

Detailed description of the five benchmark regression datasets.

DatasetDataAttributes
TrainingValidationTesting
Breast Cancer98505032
Parkinson50027027026
SinC5000250025001
Servo3841921924
Yacht Hydro150797913
Attributes of all the datasets have been normalized to [-1, 1] and we focus on the training time and testing accuracy's means and variance. A 20-fold cross validation method is taken to get the average of 20 repeated experiments to minimize the error. The whole dataset is divided into training set, validation set, and testing set without overlap. The results are shown in Table 5.
Table 5

Results of the five algorithms on the five benchmark regression datasets.

DatasetAlgorithmTrainingTesting AccuracyHidden
Time (s)MeansStDevNodes
Breast CancerAIS-ELM14.898 2.46E-01 1.32E-02 30
DS-ELM15.3672.53E-011.63E-0230
PSO-ELM15.9022.98E-012.35E-0230
SaE-ELM16.3422.65E-011.76E-0230
ELM0.0082.99E-012.07E-0250
ParkinsonAIS-ELM20.287 1.68E-01 3.35E-02 30
DS-ELM21.3491.79E-013.67E-0230
PSO-ELM22.5471.87E-014.12E-0230
SaE-ELM22.9751.89E-013.95E-0230
ELM0.0112.12E-014.53E-0250
ServoAIS-ELM14.942 8.81E-02 9.83E-0320
DS-ELM15.2569.41E-02 9.63E-03 20
PSO-ELM15.2781.17E-011.35E-0220
SaE-ELM15.4561.07E-011.45E-0220
ELM0.0071.35E-011.95E-0230
YachtAIS-ELM13.478 1.76E-01 4.32E-02 20
DS-ELM13.7551.87E-014.52E-0220
PSO-ELM13.8342.45E-015.63E-0220
SaE-ELM14.2922.23E-015.60E-0220
ELM0.0062.67E-018.43E-0230
SinCAIS-ELM33.012 6.12E-03 3.54E-04 30
DS-ELM33.5146.35E-034.32E-0430
PSO-ELM33.0957.46E-035.41E-0430
SaE-ELM33.8217.93E-035.76E-0430
ELM0.0138.01E-033.84E-0450
Considering the training time, it is also obvious that traditional ELM is the fastest because of the same reason in 5.1. As for the testing accuracy, AIS-ELM, DS-ELM, PSO-ELM, and SaE-ELM obtain better results with less hidden nodes than ELM, which means that AIS-ELM, DS-ELM, PSO-ELM, and SaE-ELM can achieve better generalization performances with more compact networks. And the RMSE of AIS-ELM is smaller than other four algorithms. Therefore, it can be concluded that AIS-ELM can achieve better performance than other four algorithms on regression problems.

6. Conclusion

In this paper, first we introduce the standard ELM and artificial immune system; then we propose a new approach named artificial immune system extreme learning machine (AIS-ELM). In AIS-ELM, AIS is used to optimize the input weights through clone, mutation, and substitution process. In the experiment part of this paper, AIS-ELM is compared with DS-ELM, PSO-ELM, SaE-ELM, and the traditional ELM on thirteen well-known benchmark datasets (eight classification datasets and five regression datasets) obtained from UCI Machine Learning Repository. Besides, the training times between AIS-ELM and BP, SVM, and traditional ELM are compared on three benchmark classification problems. Experimental results show that AIS-ELM can achieve better testing results (smaller RMSE on regression and higher accuracy on classification) than other DS-ELM, PSO-ELM, SaE-ELM, and the traditional ELM in most cases, and its training speed is significantly faster than that of BP and SVM. According to the global search ability [21] and good convergence [22] of AIS, our artificial immune system extreme learning machine is superior to the other methods both on the eight classification datasets and five regression datasets in the experiments. In addition, there are six medical datasets among the thirteen datasets, which can prove that AIS-ELM can also play an excellent role in healthcare. Future research works will be concentered on how to apply the current immune system to some new directions, such as NLP and computer vision.
  5 in total

1.  Architecture for an artificial immune system.

Authors:  S A Hofmeyr; S Forrest
Journal:  Evol Comput       Date:  2000       Impact factor: 3.277

2.  Optimization by simulated annealing.

Authors:  S Kirkpatrick; C D Gelatt; M P Vecchi
Journal:  Science       Date:  1983-05-13       Impact factor: 47.728

3.  Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination.

Authors:  J K Percus; O E Percus; A S Perelson
Journal:  Proc Natl Acad Sci U S A       Date:  1993-03-01       Impact factor: 11.205

4.  Theoretical studies of clonal selection: minimal antibody repertoire size and reliability of self-non-self discrimination.

Authors:  A S Perelson; G F Oster
Journal:  J Theor Biol       Date:  1979-12-21       Impact factor: 2.691

5.  ICGA-PSO-ELM approach for accurate multiclass cancer classification resulting in reduced gene sets in which genes encoding secreted proteins are highly represented.

Authors:  Saras Saraswathi; Suresh Sundaram; Narasimhan Sundararajan; Michael Zimmermann; Marit Nilsen-Hamilton
Journal:  IEEE/ACM Trans Comput Biol Bioinform       Date:  2011 Mar-Apr       Impact factor: 3.710

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.