- document
-
van Bilsen, J.H.M. (author), Dulos, R. (author), van Stee, M.F. (author), Meima, M.Y. (author), Rouhani Rankouhi, T. (author), Neergaard Jacobsen, L. (author), Staudt Kvistgaard, A. (author), Garthoff, J.A. (author), Knippels, L.M.J. (author), Knipping, K. (author), Houben, G.F. (author), Verschuren, L. (author), Meijerink, M. (author), Krishnan, S. (author)A healthy immune status is strongly conditioned during early life stages. Insights into the molecular drivers of early life immune development and function are prerequisite to identify strategies to enhance immune health. Even though several starting points for targeted immune modulation have been identified and are being developed into...article 2020
- document
-
de Boer, M.H.T. (author), Verhoosel, J.P.C. (author)Creating ontologies is an expensive task. Our vision is that we can automatically generate ontologies based on a set of relevant documents to create a kick-start in ontology creating sessions. In this paper, we focus on enhancing two often used methods, OpenIE and cooccurrences. We evaluate the methods on two document sets, one about pizza and...conference paper 2020
- document
- Raaijmakers, S. (author), Brewster, C. (author) conference paper 2018
- document
-
Spitters, M. (author), Klaver, F. (author), Koot, G. (author), Staalduinen, M.V. (author)Anonymity networks like Tor harbor many underground markets and discussion forums dedicated to the trade of illegal goods and services. As they are gaining in popularity, the analysis of their content and users is becoming increasingly urgent for many different parties, ranging from law enforcement and security agencies to financial institutions...conference paper 2015
- document
-
Hettne, K.M. (author), Kleinjans, J. (author), Stierum, R.H. (author), Boorsma, A. (author), Kors, J.A. (author)This chapter concerns the application of bioinformatics methods to the analysis of toxicogenomics data. The chapter starts with an introduction covering how bioinformatics has been applied in toxicogenomics data analysis, and continues with a description of the foundations of a specific bioinformatics method called text-mining. Next, the...bookPart 2014
- document
-
Spitters, M.M. (author), Eendebak, P.T. (author), Worm, D.T.H. (author), Bouma, H. (author)Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming for security services to monitor all these open...conference paper 2014
- document
-
Amardeilh, F. (author), Kraaij, W. (author), Spitters, M.M. (author), Versloot, C.A. (author), Yurtsever, S. (author)Domain ontologies are a central component in the Virtuoso demonstrator, a system that captures, analyzes and aggregates open news sources in order to achieve an information position that supports complex decision processes in the context of border control. However, maintenance of such an ontology is a challenging task. We demonstrate a text...conference paper 2013
- document
-
Hettne, K.M. (author), Boorsma, A. (author), van Dartel, D.A.M. (author), Goeman, J.J. (author), de Jong, E. (author), Piersma, A.H. (author), Stierum, R.H. (author), Kleinjans, J.C. (author), Kors, J.A. (author)Background: Availability of chemical response-specific lists of genes (gene sets) for pharmacological and/or toxic effect prediction for compounds is limited. We hypothesize that more gene sets can be created by next-generation text mining (next-gen TM), and that these can be used with gene set analysis (GSA) methods for chemical treatment...article 2013