Cloning

View this topic in
Cloning in biology is the process of producing similar populations of genetically identical individuals that occurs in nature when organisms such as bacteria, insects or plants reproduce asexually. (Wikipedia.org)






Conferences related to Cloning

Back to Top

2019 41st Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore


2019 IEEE 58th Conference on Decision and Control (CDC)

The CDC is recognized as the premier scientific and engineering conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, systems and control, and related areas.The 58th CDC will feature contributed and invited papers, as well as workshops and may include tutorial sessions.The IEEE CDC is hosted by the IEEE Control Systems Society (CSS) in cooperation with the Society for Industrial and Applied Mathematics (SIAM), the Institute for Operations Research and the Management Sciences (INFORMS), the Japanese Society for Instrument and Control Engineers (SICE), and the European Union Control Association (EUCA).


2019 IEEE International Ultrasonics Symposium (IUS)

The conference covers all aspects of the technology associated with ultrasound generation and detection and their applications.


2019 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2020 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE)

ICSE is the premier forum for researchers to present and discuss the most recent innovations, trends, outcomes, experiences, and challenges in the field of software engineering. The scope is broad and includes all original and unpublished results of empirical, conceptual, experimental, and theoretical software engineering research.


More Conferences

Periodicals related to Cloning

Back to Top

Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Circuits and Systems II: Express Briefs, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals

Most published Xplore authors for Cloning

Back to Top

Xplore Articles related to Cloning

Back to Top

Technology '89: software

IEEE Spectrum, 1989

Software developments during 1988 are examined. Among them are: competition among various versions of Unix; the Mach operating system, in both Unix and non-Unix versions; efforts to standardize parallel Fortran; and supercompilers.<<ETX>>


Technology '88: personal computers

IEEE Spectrum, 1988

The state of the personal computer field in 1987, in the wake of IBM's introduction of a completely new line of personal computers, known as the Personal System/2, is examined. The possibility that the formerly monolithic IBM PC standard might develop along several different paths is discussed. Other developments, including an open-architecture Apple Macintosh model, are described. An expert opinion ...


Technology '89: personal computers

IEEE Spectrum, 1989

Advances in personal computer technology during 1988 are highlighted. Among the developments discussed are: the IBM PS/2 Model 30 286, a successor to the PC/AT; the adoption of a bus standard by nine PC makers, an extension to IBM's old PC/AT bus, to be called the Extended Industry Standard Architecture (EISA): better screens and more storage for laptops; and the ...


Notice of Retraction: Protein Phosphorylation of NRF1 Is Influenced by MCRS2

2011 5th International Conference on Bioinformatics and Biomedical Engineering, 2011

Nrf1 [p45 nuclear factor-erythroid 2 (p45 NF-E2)-related factor 1], a member of the CNC bZIP (CNC basic region leucine zipper) family, is known to be a transcriptional activator by dimerization with its distinct partners, such as Maf, FosB, c-Jun, JunD, etc. The transcriptional roles of CNC-bZIP family are demonstrated to be involved in globin gene expression as well as the ...


Towards improved Clonal Selection Algorithm by increasing the diversity degree of antibody

2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, 2011

Premature convergence is known as the most important problem in Clonal Selection Algorithm (CSA). In this article, we study this problem and propose a novel algorithm to increase the diversity degree of antibody, which is known as an effective way to improve the performance of CSA. Though it is quite simple, our simulation with Traveling Salesman Problem (TSP) shows that ...


More Xplore Articles

Educational Resources on Cloning

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Cloning"

IEEE-USA E-Books

  • Technology '89: software

    Software developments during 1988 are examined. Among them are: competition among various versions of Unix; the Mach operating system, in both Unix and non-Unix versions; efforts to standardize parallel Fortran; and supercompilers.<<ETX>>

  • Technology '88: personal computers

    The state of the personal computer field in 1987, in the wake of IBM's introduction of a completely new line of personal computers, known as the Personal System/2, is examined. The possibility that the formerly monolithic IBM PC standard might develop along several different paths is discussed. Other developments, including an open-architecture Apple Macintosh model, are described. An expert opinion is offered by Allen L. Hankinson, chief of the systems and software technology division of the Institute for Computer Sciences and Technology at the National Bureau of Standards, who contends that personal computers now resemble workstations.<<ETX>>

  • Technology '89: personal computers

    Advances in personal computer technology during 1988 are highlighted. Among the developments discussed are: the IBM PS/2 Model 30 286, a successor to the PC/AT; the adoption of a bus standard by nine PC makers, an extension to IBM's old PC/AT bus, to be called the Extended Industry Standard Architecture (EISA): better screens and more storage for laptops; and the arrival of a graphic user interface for OS/2.<<ETX>>

  • Notice of Retraction: Protein Phosphorylation of NRF1 Is Influenced by MCRS2

    Nrf1 [p45 nuclear factor-erythroid 2 (p45 NF-E2)-related factor 1], a member of the CNC bZIP (CNC basic region leucine zipper) family, is known to be a transcriptional activator by dimerization with its distinct partners, such as Maf, FosB, c-Jun, JunD, etc. The transcriptional roles of CNC-bZIP family are demonstrated to be involved in globin gene expression as well as the antioxidant response. MCRS2, a protein with transforming, nucleolar sequestration, ribosomal gene regulation, as well as telomerase inhibition activities, was identified as a novel interacting protein of Nrf1. In this study, we find that ERK1/2 phosphorylates Nrf1 during the interaction between Nrf1 and MCRS2. The phosphorylation of Nrf1 is induced by MCRS2 among the interactions between MCRS2 and Nrf1.

  • Towards improved Clonal Selection Algorithm by increasing the diversity degree of antibody

    Premature convergence is known as the most important problem in Clonal Selection Algorithm (CSA). In this article, we study this problem and propose a novel algorithm to increase the diversity degree of antibody, which is known as an effective way to improve the performance of CSA. Though it is quite simple, our simulation with Traveling Salesman Problem (TSP) shows that our work is effective to prevent CSA from stopping search too early as in its original version. As compared with three existing works, our work demonstrates obvious gain within the same number of generations, and the actual time cost is ignorable.

  • Two-scale image harmonious cloning

    A novel two-scale decomposition-based harmonious cloning algorithm over images is presented in this paper. Different from previous methods, we first decompose the lightness channel of the image into two scales: the base layer and the detail layer. Then, we process each scale using different fashions. Finally, we use mean value interpolation to solve image cloning problem. Our cloned result matches well with the target image on the detail and is seamlessly. Our approach can obtain visually pleasing cloned result between different appearance images, which is problematic in previous image cloning methods. Experimental results demonstrate the effectiveness of our harmonious cloning algorithm.

  • The curse of copy&amp;paste — Cloning in requirements specifications

    Cloning in source code is a well known quality defect that negatively affects software maintenance. In contrast, little is known about cloning in requirements specifications. We present a study on cloning in 11 real-world requirements specifications comprising 2,500 pages. For specification clone detection, an existing code clone detection tool is adapted and its precision analyzed. The study shows that a considerable amount of cloning exists, although the large variation between specifications suggests that some authors manage to avoid cloning. Examples of frequent types of clones are given and the negative consequences of cloning, particularly the obliteration of commonalities and variations, are discussed.

  • Drawing Chemical Equipment with Adobe Illustrator, Part 1: Basic Drawing and Selection Tools

    Adobe Illustrator CS3 provides sufficient tools to let authors of chemistry textbooks and laboratory manuals create complex drawings and publish their own original materials. This paper focuses on tools necessary for creating basic shapes: selection tools, drawings tools and text tools.

  • Intrusion Detection System Platform Based on Light-Weighted Hybrid Artificial Immune Algorithms

    Detectors generation algorithm plays an important role in IDS. In this paper, an IDS platform based on light-weighted HIDS is bought up. Firstly raw data is extracted by PCA for effective detection. And then detector generation algorithms based on NSA, SCSA, DCSA are implemented and simulated on PCA processed data. Tests have proved their efficiency. Hybrid intrusion detection is designed for real time detection and high detection rate. Finally, a comprehensive IDS platform is designed combining all above algorithms to compare performances and further study.

  • Perturbations of CNNs

    If a CNN template, through the application of one of the sign-changing transformations T defined by Chua and Wu (see Int. Journal of Circuit Theory and Applications, vol. 20, p.497-517, 1992), is positive and cell-linking and has isolated equilibria then the convergence of the original CNN follows; this is theorem 4 of the aforementioned paper. The main results of this paper use the condition of isolated equilibria. We show that it is possible to drop this requirement by demonstrating that having isolated equilibria is a generic condition on templates. Thus all templates can be perturbed slightly to a 'close' template, which has isolated equilibria. Perturbing templates allows us to consider the useful idea of making new sufficiently weak, cell connections in convergent CNN, so that the perturbed CNN is also convergent.<<ETX>>



Standards related to Cloning

Back to Top

No standards are currently tagged "Cloning"


Jobs related to Cloning

Back to Top