Bioinformatics Computing
Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.
Подобные документы
Analysis opportunities for using cloud technologies in higher education in Ukraine. The main task of cloud technologies, strategic and tactical goals of cloud computing at the technical universities. The typical structure of a technical university.
статья, добавлен 05.04.2019How data visualization can help in genomic sequence analysis. The fragment of genetic text of a bacterial genome and analyzing its structure. The information in the genome encoded by non-overlapping triplets. Finding out the real gene positions.
статья, добавлен 08.02.2013Описание алгоритмов кластеризации, реализующих задачу поиска изображений по содержанию –Content-Based Image Retrieval. Определение признаков изображения, по которым формируются кластеры изображений и рассмотрение способов извлечения данных признаков.
статья, добавлен 29.07.2017Наиболее важные свойства компонента Image, доступные в инспекторе объектов. Алгоритм создание простейшей программы для просмотра графических файлов. Примерный вид формы разрабатываемого приложения. Изображение окна программного проекта после запуска.
лабораторная работа, добавлен 11.03.2014Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
книга, добавлен 08.03.2014Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.
дипломная работа, добавлен 27.08.2016Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.
лекция, добавлен 28.12.2013The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
статья, добавлен 28.08.2016Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.
курсовая работа, добавлен 13.07.2014Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.
курс лекций, добавлен 08.03.2014Анализ клиентской части программного обеспечения для социальной сети "Image Poster". Выбор типовой архитектуры. Разработка UML–диаграмм для программного обеспечения для социальной сети. Интерфейс клиентской части. Загрузка и комментирование фотографий.
дипломная работа, добавлен 25.05.2017Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
статья, добавлен 25.12.2016The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
статья, добавлен 04.10.2022Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
презентация, добавлен 06.02.2017To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
статья, добавлен 29.01.2016Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.
статья, добавлен 22.03.2023Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
статья, добавлен 22.12.2016Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
материалы конференции, добавлен 08.03.2014