- Introduction: Optimising BioTek’s Network Infrastructure
- Part 1: Networking Principles, Protocols, and Operations for BioTek
- LO1: Networking principles and their protocols
- LO2 Networking devices and operations
- Part 2: Design and Implementation of BioTek Network System
- LO3 Designing efficient networked systems
- LO4 Implementing and diagnosing networked systems
Introduction: Optimising BioTek’s Network Infrastructure
The network infrastructure for the new BioTek center, which includes modern equipped labs and other additional system features, has been assigned to me as a networking consultant to be designed, incorporating five units: Head Office, Packing and Assembling, Sales, Marketing, and a Laboratory, with the task of planning, designing, implementing, and testing. The project manager has requested that a network infrastructure be created, utilizing Packet Tracer or any network simulation of my choice, to meet the specific business requirements of BioTek. A reliable, efficient, and secure network infrastructure that meets BioTek's business needs has been designed, incorporating switches, routers, wireless routers, cables, servers, printers, and other network devices, tailored to the specific needs of BioTek's operations and adhering to industry best practices and standards, using the latest technologies and equipment, to create a network infrastructure that supports BioTek's growth and success and provides a solid foundation for their technological needs.
Part 1: Networking Principles, Protocols, and Operations for BioTek
LO1: Networking principles and their protocols
Types of Networks
There are four primary types of computer networks, each with its own set of benefits and drawbacks based on the needs of the company or individual (Shahsavar et al. 2021).
The first type of network is a Local Area Network (LAN), which is a network that is restricted to a small geographic region such as a house, office, or building. LANs are frequently used to share resources such as printers and internet access, as well as to ease communication and data transmission among network devices.
The second form of network is a Wide Area Network (WAN), which is a network that spans a vast geographical region, such as a city, nation, or even the entire globe. Businesses with several locations frequently employ WANs to provide communication and data transmission across different offices or branches (Kang et al. 2021).
The third type of network is a Metropolitan Area Network (MAN), which is a network that generally exists inside a single city or metropolitan region and spans a wider geographic area than a LAN but is smaller than a WAN (Khan et al. 2021).
A Wireless Local Area Network (WLAN) is a form of network that links devices inside a constrained geographic region, such as a house, workplace, or public area, using wireless technology. WLANs are frequently used to share resources like files and printers as well as to connect linked devices to the internet (Singh et al. 2021).
Network benefits and constraints
Advantages
LANs offer high-speed connectivity, data sharing, and resource sharing within a limited geographical area. WANs connect devices across large geographical areas, and MANs connect devices over an even larger geographical area. WLANs offer flexible connectivity, are easy to set up and maintain, and allow users to access the network from anywhere within the coverage area (Panetti et al. 2020).
Disadvantages
LANs are limited to a small geographic area and are not suitable for connecting devices located far away. WANs are expensive to set up and maintain and can be vulnerable to security threats. MANs are also expensive to set up and maintain and are not suitable for small businesses and individuals. WLANs are vulnerable to security threats and have a limited coverage area, making them less suitable for large networks (Graf and Broekel, 2020).
Network Standards
The definitions and protocols that describe how network devices communicate with one another are referred to as network standards. Standards make it possible for devices from many manufacturers to operate together effortlessly and for data to be transferred between them in a secure and effective manner (Chang et al. 2023).
Standards improve or support many types of networks by establishing a standard language and set of communication rules. This ensures that devices can interact with one another regardless of manufacturer or origin, making network construction and maintenance easy. Ethernet, for example, is a widely used LAN standard, whereas TCP/IP is a WAN and internet standard. These standards let devices interact with one another across networks and locations, improving connection and enabling global communication. Overall, network standards serve a critical role in assuring network reliability, interoperability, and security (Paiva et al. 2020).
Impact of different types of network topologies
The topology chosen must meet the unique requirements of the network, taking into account aspects like cost, reliability, scalability, and administrative simplicity (Dave and Layton, 2019). There are several kinds of network topology, such as:
- Bus Topology: All devices are linked together by a single wire in a bus topology. The simplicity and low cost of setting up this topology make it advantageous, but the network as a whole has been harmed if the main connection breaks (Repecka et al. 2021).
- Star Topology: Each device is linked to the central hub or switch in a star architecture. This topology has the benefit of not affecting the rest of the network if one device fails. The drawback is that it needs more wiring and may cost more to set up (Vlaisavljevic et al. 2020).
- Ring Topology: Each device in a ring topology is connected to two surrounding devices, producing a closed loop. This architecture has the benefit of providing equal access to all devices and is easily extensible. The drawback is that if one device fails, the entire network might be disrupted (Fouladiha et al. 2020).
- Mesh Topology: Each device in a mesh architecture is linked to every other device in the network. This topology has the advantage of providing redundant pathways, making it more dependable and fault-tolerant. The negative is that it is costly to put up and run (Ghazi et al. 2019).
- Tree Topology: Devices are placed in a tree topology, each level of which is linked to a hub or switch at the centre. This architecture has the benefit of supporting huge networks and being simple to extend. The drawback is that the network as a whole may be impacted if the primary hub or switch malfunctions (Guo and Murray, 2019).
Communication and bandwidth requirements
Due to the way they send data, various network topologies demand different amounts of communication and bandwidth. For instance, bus and ring topologies have limited bandwidth because they need a certain window of time to transmit data. With a bus architecture, all devices share a single communication channel, which increases the risk of accidents and slows down communication. A ring topology can cause delay and longer transmission times since the signal must transit through each device before it can reach its destination (Soares et al. 2020).
Star and mesh topologies, on the other hand, provide more bandwidth capacity because they provide dedicated communication channels between devices. Each device in a star topology is linked to a central hub or switch, which may handle several data streams at the same time. With a mesh topology, many channels are available for data transmission, which can alleviate congestion and enhance communication rates. These topologies, however, might be more expensive to put up and manage (Aderghal et al. 2020).
Common networking principles
There are various networking principles that must be followed in order to construct and maintain dependable and effective networks. Scalability, redundancy, security, and manageability are some of these concepts (Li et al. 2022). Scalability refers to a network's capacity to support growth and development over time. A scalable network may be quickly modified or expanded without needing large infrastructure upgrades (Aggarwal, 2020). This is critical for businesses that anticipate growth or changes in their networking requirements. Another important networking principle is redundancy, which is putting backup systems or components in place to guarantee that the network remains functioning in the case of a malfunction or outage. These can include redundant hardware, numerous internet service providers, or failover mechanisms that switch to backup systems automatically when needed (Karthick et al. 2021).
Another important networking aspect is security, especially in the increasingly interconnected world of today. Unauthorized access, data breaches, and other security risks must all be guarded against via a secure network (Kryeziu et al. 2022). These can include access restrictions, firewalls, encryption, and other security measures. The capacity to monitor, configure, and maintain a network with ease is referred to as manageability. When problems do develop, a well-managed network makes it simpler to troubleshoot and fix them. It may also assist keep problems from arising in the first place (Liu et al. 2019).
These networking fundamentals are crucial for creating and sustaining efficient networks. These should be carefully taken into account when developing and implementing a new network since they each have a special function to play in making sure the network is dependable, effective, and secure (Park et al. 2020).
Network protocols
Modern computer networks cannot function without protocols. They are a collection of guidelines and requirements that specify how information is sent over a network. The formats and structures of data packets, as well as the techniques for error detection, correction, and flow management, are specified by the protocols. These guidelines make sure that data is transferred through the network effectively and reliably, and they also aid in preventing data loss or corruption (Terrell et al. 2021).
The capacity of protocols to facilitate interoperability across various systems and devices is one of its main advantages. Devices from various vendors or manufacturers can effortlessly interact with one another provided they adhere to the same rules and standards. This is crucial for the efficient operation of international networks and for facilitating communication and cooperation across many companies or locations.
LO2 Networking devices and operations
Operating principles network devices
Switches, routers, and firewalls are critical for establishing and maintaining a secure network. Switches employ Layer 2 switching to forward frames across network segments depending on MAC addresses. VLANs are used to logically partition a network, while Access Control Lists (ACLs) are used to regulate access to network resources. Routers employ routing to forward data packets based on IP addresses between network segments. Network Address Translation (NAT) converts private IP addresses to public IP addresses, whereas firewalls regulate access to network resources based on IP addresses, ports, and other criteria. All of this equipment and technologies are required to build a safe and efficient network.
Operating principles end devices
An operating system is used by end devices, such as desktop and laptop computers and mobile phones, to control their hardware and software resources. A client or end device's requests are processed by server types like web servers and application servers, which subsequently deliver a response. To manage their hardware and software resources and to give users a way to communicate with the server, all servers need an operating system like Linux or Windows.
Relationship between terminal network hardware and network software
The connection between network software with workstation hardware is essential to a network's performance and dependability. The actual parts of a computer, such as the CPU, Memory, hard drive, and network adapter, are referred to as workstation hardware. The programs and protocols that operate on networks, including as operating systems, network drivers, and network management tools, are collectively referred to as network software.
A crucial component of every network is the interaction between network software and workstation hardware. The physical parts of a network include workstation gear, such as personal computers, which offer the required processing power, storage, and communication interfaces. The software that connects and facilitates communication between various workstations and other network resources is known as network software.
The workstations wouldn't be able to connect or access shared resources without network software. By adding a degree of protection, network software enables administrators to design and monitor network settings as well as regulate who has access to the network. Lastly, network software enables the distribution of files and other resources, like printers, throughout the network.
Suitable Servers for the given scenario
Several types of servers could be suitable and evaluated in terms of cost and performance depending on the specific needs of the BioTek pharmaceutical company, to be considered important or appropriate.
- File Server: A server type devoted to managing and storing files is called a file server. This may be a good alternative for BioTek as they might need a centralized area to store and distribute data for administrative, research, and development activities. Depending on the required hardware and storage space, file servers might range in price. They are often inexpensive and simple to put up, though. File servers may be built to manage enormous volumes of data and provide effective data transfer rates in terms of performance.
- Database Server: A database server is intended to centrally store and handle massive volumes of data. This may be appropriate for BioTek since they may require a central area to keep research data and information. Because of the specific hardware and software required, the cost of a database server can be rather costly. Database servers, on the other hand, are built to manage large amounts of data and give quick processing rates.
The choice of server type for BioTek can vary on their individual demands and requirements. While database servers are more adept at handling enormous volumes of data, file servers can provide a cost-effective alternative for organizing and storing files.
Recommendation of topology for BioTek Company
The star topology would be an appropriate network topology based on the requirements of BioTek Corporation. With this design, all nodes are linked to a single hub or switch, which serves as the network's core point of control. For various reasons, the star topology is appropriate for BioTek Corporation.
The star topology is both scalable and adaptable. It readily accommodates more nodes as the organization expands, and it allows for the addition of additional switches or hubs to extend the network as needed. As a result, it is a good fit for BioTek Corporation, which may need to extend its network in the future.
Part 2: Design and Implementation of BioTek Network System
LO3 Designing efficient networked systems
Network Design Goal for Bio Tek
A network architecture is needed to link the five units and divisions of the BioTek center, comprising its Corporate Headquarters, Packaging & Assembling, Marketing, Marketing, and Laboratory, according to the scenario described. The design should contain all the gear and software identified in Part 1, including switching, networks, Wi-Fi access points, cabling, servers, and printers. Also, all staff members should be linked to the network automatically and have dependable, secure internet access as part of the network design. Using a network diagram tool, such as Packet Tracer from Cisco, both physical and logical views of the system should be constructed, and screenshots of both views must be provided, in order to graphically illustrate the network design. Any computer system, particularly the one used at the new BioTek center, must have switches and routers.
Figure 1: Network structure of Bio Tek’s head office
The following figure shows the created network structure developed for the organization of Bio Tek’s head office.
Switches join several devices together to form a neighborhood network by operating at the data connection layer that makes up the OSI model. Depending on their MAC address, switches transfer packets of data to the target device. To facilitate resource sharing and communication, switches in the BioTek network can be utilised to connect the pcs for each component, including that of the Corporate Headquarters, Packing and Assembly, Sales, and Laboratory units.
Figure 2: Network structure of Bio Tek’s Lab
The following figure shows the developed network structure of the laboratory of Bio Tek.
In order to create a wide area network, routers join several LANs together at the connectivity layer in the OSI model. Based on their IP address, routers transmit data packets to the desired destination device. Routers can be used in the BioTek network to link the LANs in each device to the internet and to one another, enabling smooth communication and accessibility to outside resources.
Figure 3: Network structure of Bio Tek’s Marketing
The following figure shows the created network structure of the marketing of Bio Tek.
For the network to be safe, dependable, and effective, routers and switches are both necessary. They can be set up with access control lists to prevent access from unauthorised users, and they can employ Quality of Service to prioritise network traffic in order to make sure that time-sensitive information gets transmitted without delay.
Figure 4: Ip configuration
Figure 5: Network structure of Bio Tek’s sales
The following figure shows the network structure of the sales of the Bio Tek organization.
Evaluation of network design
- Scalability: When developing a computer network, scalability is an important consideration, especially for companies that plan to grow and expand over time. The capacity to expand groups of users, network resources, and programs without negatively affecting network performance is essential in the scenario involving the brand-new BioTek center network. The network infrastructure must be built with room for growth, such as extra ports on routers and switches, in order to provide scalability. The network design should also be optimized to enable effective data flow, and network devices must be chosen based on their capacity to accommodate rising traffic and user demands. Frequent performance tweaking and monitoring can also assist in ensuring that the system is flexible enough to grow with the company's needs.
- Availability: The extent to which networking resources and services are accessible to end users is referred to as availability in the setting of the brand-new BioTek center network. The internet infrastructure should be built with redundancies and failover features including backup power supplies, distributed network pathways, and redundant servers to achieve high availability. Periodic upkeep and surveillance can also assist in finding and addressing possible failure areas before they have an influence on network availability. The ultimate objective is to guarantee that end users have constant access to network resources and services with little to no downtime or disruption.
- Security: A crucial component of the new BioTek center network is security. The network infrastructure must be designed with the necessary security measures, such as authentication and authorization protocols, access control lists, and encryption techniques, to guarantee the secrecy, authenticity, and reliability of network resources. Data and users should also be shielded against potential dangers including viruses, malware, and unauthorized access. The network can remain safe and protected against changing threats with the help of regular security updates and audits.
- Manageability: A crucial factor for such a new BioTek center network is manageability. The infrastructure should be constructed with simplicity in mind, with automation and centralized network administration tools included when appropriate. However, there are possible dangers that may hamper deployment, including compatibility concerns among various network software and hardware components, inadequate training staff, and inadequate network documentation. These hazards can be reduced with proper planning, testing, employee training, adequate support, and thorough network documentation.
Installation and configuration of network services (DHCP Server)
A DHCP server needs to be set up and configured to satisfy the new BioTek center’s network requirements. All machines on the network receive dynamic IP addresses automatically from DHCP, negating the need for human configuration. When setting network devices, this may save time or lessen the possibility of mistakes. The network manager should first choose a suitable server and install its DHCP service before installing and configuring a DHCP server. The range of IPs that are going to be allocated to network devices should then be defined in the DHCP scope. To further simplify network setup and management, further DHCP options can be selected, such as DNS and source address settings.
Network system maintenance schedule
Tasks | Maintenance Schedule | Checking Schedule (day/week/month |
Fault Management | Monthly | Weekly |
Configuration Management | Quarterly | Monthly |
Accounting Management | Quarterly | Monthly |
Security Management | Bi-Annually | Weekly |
A monthly timetable is suggested for fault management to proactively find and fix network problems before they get worse. Network monitoring software and other fault management tools can be checked every week to help find any possible problems that need to be fixed right away. Manage network hardware, including servers, switches, and routers, as part of configuration management. A monthly maintenance schedule is advised, with regular checks to make sure all devices are configured correctly and to guarantee the network remains reliable and effective.
Helps promote billing tracking are part of accounting management. To ensure precise accounting records, a quarterly maintenance plan is advised. Billing data should also be checked every month to make sure it is being recorded correctly. Implementing and enforcing security controls is necessary to safeguard the network against threats. A bi-annual maintenance plan is advised, with weekly reviews to monitor log data and spot potential threats. This has helped to guarantee that the system remains secure. Generally, the timeline for network maintenance should be responsive to shifting business requirements and technological developments. For the freshly opened BioTek center to achieve its business goals, regular upkeep and surveillance can assist in guaranteeing that the system remains reliable, secure, and effective.
LO4 Implementing and diagnosing networked systems
Implementation of network system
The first stage in establishing the network infrastructure for the new BioTek center is setting up all machines to utilize dynamic IP addresses through DHCP (Dynamic Host Configuration Protocol). By doing this, you can make sure that each network-connected device gets a special IP address automatically, without needing to manually configure it. There is a need to install DHCP servers in each unit (department), which control how IP addresses are assigned to devices connected to that unit's network. Each device has an IP address from the DHCP server along with additional network setup data including the subnet mask, default gateway, and DNS server details.
A DHCP server is set up on a dedicated server machine for the Head Office unit. A pool of IP addresses has been set up on this server to be distributed across the unit's 12 PCs. The computers have been also getting information from the DHCP server about network settings, including the subnet mask and default gateway. For the other units (departments), including Sales, Marketing, Packing and Assembling, and Laboratory, the same procedure has been performed. There has been a DHCP server for each unit, and those servers have been set up to assign IP addresses to the computers within each unit.
The computers can access the network after the DHCP servers are configured. A computer automatically requests an IP address from its unit's DHCP server when it joins the network. The PC has been receiving a free IP address from the DHCP server along with other network configuration details. It made sure that every device connected to the network has a different IP address without requiring any manual configuration by setting up all PCs to utilize dynamic IP addresses using DHCP. By doing so, you may avoid the potential for manual IP address setting problems and save time. It is simple to maintain and keep an eye on the network, which makes future troubleshooting easier.
Documentation and analysis of test results
Many network commands, including Ping, IPConfig, Tracert, and PathPing, may be used to evaluate the network architecture that is created for BioTek's new facility. Some instructions are used to identify and fix network problems. Ping is a command used to evaluate the connection between two devices on a network. It transmits a data packet to a certain IP address and then waits for a reply. The Ping command has been returning a successful result if the device at the destination IP address answers, demonstrating the connection between the two devices. The Ping command may be used to check the connectivity between the computers in each unit to make sure they can talk to one another.
A network device's IP configuration information, including its IP address, subnet mask, default gateway, and DNS server information, is displayed by the ipconfig command. The IPConfig command can be used to check that the network configuration information is accurate and that each device on the network has been given a distinct IP address through DHCP. The command "Tracert" enables us to track a packet's path to its destination. It displays the time it takes to reach each device along with the IP addresses of all the devices the packet passes through.
Network Enhancement
The network infrastructure for BioTek's new center can be improved by implementing VLANs, the most recent security measures, and network monitoring tools. Network segmentation can be done to enhance performance while also enhancing security, reducing congestion, and streamlining network administration. Implementing firewalls, intrusion detection systems, and antivirus software can assist in defending the network against online threats, spotting and preventing illegal access, and alerting it to any suspicious activity. Network analyzers and performance monitoring software can be used to monitor network traffic, spot bottlenecks, find network faults early on, and offer insight into network performance.
Conclusion and recommendations
Organization size, application kinds, and communication needs are just a few of the elements that must be taken into account while designing a network infrastructure for a business. To make sure they match the unique requirements of the firm, the network topology, server types, and protocols must also be thoroughly examined. A star topology is the best option for BioTek Corporation because it offers simple administration, dependability, scalability, and flexibility while guaranteeing there is no single point of failure. File, print, and application servers have also been needed by the firm to handle a variety of business operations. For optimal device communication and network security, adherence to established protocols like TCP/IP, HTTP, and FTP is crucial.
The right network architecture, server types, and protocols may be chosen by BioTek Corporation to build a network infrastructure that satisfies its unique business needs and efficiently supports its operations. Ultimately, a solid network infrastructure is essential for businesses to run smoothly, communicate clearly, and safeguard their data.
References
Aderghal, K., Afdel, K., Benois-Pineau, J. and Catheline, G., 2020. Improving Alzheimer's stage categorization with Convolutional Neural Networks using transfer learning and different magnetic resonance imaging modalities. Heliyon, 6(12).
Aggarwal, V.A., 2020. Resource congestion in alliance networks: How a firm's partners’ partners influence the benefits of collaboration. Strategic Management Journal, 41(4), pp.627-655.
Chang, R., Trushina, E., Zhu, K., Zaidi, S.S.A., Lau, B.M., Kueider‐Paisley, A., Moein, S., He, Q., Alamprese, M.L., Vagnerova, B. and Tang, A., 2023. Predictive metabolic networks reveal sex‐and APOE genotype‐specific metabolic signatures and drivers for precision medicine in Alzheimer's disease. Alzheimer's & Dementia, 19(2), pp.518-531.
Dave, T. and Layton, A., 2019. Bio-inspired design for resilient water distribution networks. Procedia CIRP, 80, pp.275-280.
Fouladiha, H., Marashi, S.A., Torkashvand, F., Mahboudi, F., Lewis, N.E. and Vaziri, B., 2020. A metabolic network-based approach for developing feeding strategies for CHO cells to increase monoclonal antibody production. Bioprocess and Biosystems Engineering, 43, pp.1381-1389.
Ghazi, M.M., Nielsen, M., Pai, A., Cardoso, M.J., Modat, M., Ourselin, S., Sørensen, L. and Alzheimer’s Disease Neuroimaging Initiative, 2019. Training recurrent neural networks robust to incomplete data: Application to Alzheimer’s disease progression modeling. Medical image analysis, 53, pp.39-46.
Graf, H. and Broekel, T., 2020. A shot in the dark? Policy influence on cluster networks. Research Policy, 49(3), p.103920.
Guo, S. and Murray, R.M., 2019. Construction of incoherent feedforward loop circuits in a cell-free system and in cells. ACS Synthetic Biology, 8(3), pp.606-610.
Kang, W., Lin, L., Zhang, B., Shen, X., Wu, S. and Alzheimer's Disease Neuroimaging Initiative, 2021. Multi-model and multi-slice ensemble learning architecture based on 2D convolutional neural networks for Alzheimer's disease diagnosis. Computers in Biology and Medicine, 136, p.104678.
Karthick, R., Ramkumar, R., Akram, M. and Kumar, M.V., 2021. Overcome the challenges in bio-medical instruments using IOT–A review. Materials Today: Proceedings, 45, pp.1614-1619.
Khan, K.U., Minhas, M.U., Sohail, M., Badshah, S.F., Abdullah, O., Khan, S., Munir, A. and Suhail, M., 2021. Synthesis of PEG-4000-co-poly (AMPS) nanogels by cross-linking polymerization as highly responsive networks for enhancement in meloxicam solubility. Drug Development and Industrial Pharmacy, 47(3), pp.465-476.
Kryeziu, L., Coşkun, R. and Krasniqi, B., 2022. Social networks and family firm internationalization: cases from a transition economy. Review of International Business and Strategy, 32(2), pp.284-304.
Li, G., Huang, K., Deng, J., Guo, M., Cai, M., Zhang, Y. and Guo, C.F., 2022. Highly conducting and stretchable double‐network hydrogel for soft bioelectronics. Advanced Materials, 34(15), p.2200261.
Liu, X., Silverman, A.D., Alam, K.K., Iverson, E., Lucks, J.B., Jewett, M.C. and Raman, S., 2019. Design of a transcriptional biosensor for the portable, on-demand detection of cyanuric acid. ACS Synthetic Biology, 9(1), pp.84-94.
Paiva, T., Ribeiro, M. and Coutinho, P., 2020. R&D collaboration, competitiveness development, and open innovation in R&D. Journal of Open Innovation: Technology, Market, and Complexity, 6(4), p.116.
Panetti, E., Parmentola, A., Ferretti, M. and Reynolds, E.B., 2020. Exploring the relational dimension in a smart innovation ecosystem: A comprehensive framework to define the network structure and the network portfolio. The Journal of Technology Transfer, 45, pp.1775-1796.
Park, Y., Espah Borujeni, A., Gorochowski, T.E., Shin, J. and Voigt, C.A., 2020. Precision design of stable genetic circuits carried in highly‐insulated E. coli genomic landing pads. Molecular systems biology, 16(8), p.e9584.
Repecka, D., Jauniskis, V., Karpus, L., Rembeza, E., Rokaitis, I., Zrimec, J., Poviloniene, S., Laurynenas, A., Viknander, S., Abuajwa, W. and Savolainen, O., 2021. Expanding functional protein sequence spaces using generative adversarial networks. Nature Machine Intelligence, 3(4), pp.324-333.
Shahsavar, M.M., Akrami, M., Gheibi, M., Kavianpour, B., Fathollahi-Fard, A.M. and Behzadian, K., 2021. Constructing a smart framework for supplying biogas energy in green buildings using an integration of response surface methodology, artificial intelligence, and Petri net modeling. Energy Conversion and Management, 248, p.114794.
Singh, D., Kumar, V., Yadav, V. and Kaur, M., 2021. Deep neural network-based screening model for COVID-19-infected patients using chest X-ray images. International Journal of Pattern Recognition and Artificial Intelligence, 35(03), p.2151004.
Soares, D.G., Bordini, E.A.F., Cassiano, F.B., Bronze‐Uhle, E.S., Pacheco, L.E., Zabeo, G., Hebling, J., Lisboa‐Filho, P.N., Bottino, M.C. and de Souza Costa, C.A., 2020. Characterization of novel calcium hydroxide‐mediated highly porous chitosan‐calcium scaffolds for potential application in dentin tissue engineering. Journal of Biomedical Materials Research Part B: Applied Biomaterials, 108(6), pp.2546-2559.
Terrell, J.L., Tschirhart, T., Jahnke, J.P., Stephens, K., Liu, Y., Dong, H., Hurley, M.M., Pozo, M., McKay, R., Tsao, C.Y. and Wu, H.C., 2021. Bioelectronic control of a microbial community using surface-assembled electrogenetic cells to route signals. Nature Nanotechnology, 16(6), pp.688-697.
Vlaisavljevic, V., Medina, C.C. and Van Looy, B., 2020. The role of policies and the contribution of cluster agency in the development of biotech open innovation ecosystem. Technological Forecasting and Socia