PCA and K-Means Decipher Genome
How data visualization can help in genomic sequence analysis. The fragment of genetic text of a bacterial genome and analyzing its structure. The information in the genome encoded by non-overlapping triplets. Finding out the real gene positions.
Подобные документы
Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.
учебное пособие, добавлен 25.11.2013Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
диссертация, добавлен 27.01.2015The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.
статья, добавлен 20.01.2016Theoretical information on personal computers, the structure of Windows XP as the operating system. Examples of projects in C ++ Builder to calculate complex mathematical formulas and solving problems with the branch. Programming in C ++ Builder.
методичка, добавлен 11.10.2014Conducting a comprehensive study of tools intended for modeling and digitization of business processes. Proving the importance of using infographics for better visualization and perception by specialists of individual details of the business process.
статья, добавлен 08.01.2024Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.
статья, добавлен 29.01.2016The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
статья, добавлен 25.03.2016The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
статья, добавлен 06.05.2018The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
курсовая работа, добавлен 11.02.2017Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.
статья, добавлен 22.12.2016Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
курс лекций, добавлен 11.10.2014- 64. Brute force
Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.
книга, добавлен 08.03.2014 - 65. Microsoft Word
Information about Microsoft Word, the application and purpose of the program. The features and functions of Microsoft Word. Characteristics of the main tools for creating lists, copying and moving sections of text. Text formatting, parameter control.
доклад, добавлен 09.03.2018 Deep learning is one of the most active research fields in machine learning community. It has gained unprecedented achievements in fields such as computer vision, natural language processing and speech recognition. Сhallenges posed by Big Data analysis.
статья, добавлен 18.02.2021Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
статья, добавлен 25.11.2023The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024Понятие термина Data Mining, его история возникновения. Понятие искусственного интеллекта. Сравнение статистики, машинного обучения и Data Mining. Развитие технологии баз данных начиная с 1960-х г. Data Mining как часть рынка информационных технологий.
реферат, добавлен 14.01.2015The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018- 75. Big Data
Определение термина "Big Data" и его применение в работе с информацией огромного объема и разнообразного состава. Определение основных источников получения компаниями информации. Методики анализа массивов данных и технологии Big Data в разных отраслях.
курсовая работа, добавлен 28.09.2015