Skip to main content
. 2019 Jul 3;17:972–981. doi: 10.1016/j.csbj.2019.06.024

Fig. 1.

Fig. 1

Framework of the proposed algorithm. It consists of four steps: (i) dataset construction, (ii) feature extraction and their optimization using two-step feature selection protocol, (iii) construction of two-layer prediction model, and (iv) assessment of performance and development of webserver.

HHS Vulnerability Disclosure