Skip to main content
Fig. 5 | BMC Bioinformatics

Fig. 5

From: Towards targeted combinatorial therapy design for the treatment of castration-resistant prostate cancer

Fig. 5

Computation of node vulnerability. Depicts the architecture used to compute the vulnerability of a node. x 1 to x 7 are the input stochastic bit streams for each of the seven primary inputs in the Boolean network model. The output bit streams for each of the six output components when these input sequences are propagated through the circuit with a dysfunctional node (whose vulnerability we want to compute) are denoted by \(y_{1}^{*}\) to \(y_{6}^{*}\) whereas those for the fault-free circuit are labeled as y 1 to y 6

Back to article page