PCA and K-Means Decipher Genome
How data visualization can help in genomic sequence analysis. The fragment of genetic text of a bacterial genome and analyzing its structure. The information in the genome encoded by non-overlapping triplets. Finding out the real gene positions.
Подобные документы
Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
???????????, добавлен 01.09.2018Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
?????, добавлен 08.03.2014- 78. Big Data
??????????? ??????? "Big Data" ? ??? ?????????? ? ?????? ? ??????????? ????????? ?????? ? ?????????????? ???????. ??????????? ???????? ?????????? ????????? ?????????? ??????????. ???????? ??????? ???????? ?????? ? ?????????? Big Data ? ?????? ????????.
???????? ??????, добавлен 28.09.2015 The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
??????, добавлен 07.12.2016Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
??????, добавлен 13.02.2016The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
??????, добавлен 23.10.2020Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
??????, добавлен 08.08.2021The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
??????, добавлен 25.12.2016Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.
??????, добавлен 22.07.2022Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
??????, добавлен 15.09.2012The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.
??????, добавлен 18.09.2018???????? ??????? "Big Data", ???????????? ??????? ???????? ???????? ?????? ??? ??????????????? ??????????????. ????? ? ???????? ???? ????????? Big Data ? ??????????? ???????????? ??????????? ?????? ? ???????? ?? ???????? ???????? ????????????? ??????????.
??????, добавлен 24.02.2025General characteristics of the comparator model of text correspondence and objective situations described by them. Acquaintance with the most important tasks of the theory of intelligence. Analysis of functional and target models of intellectual activity.
??????, добавлен 11.10.2018The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.
???????????? ??????, добавлен 10.05.2022Fuzzy controller has two inputs and one output linguistic variables. Structural diagram of neuro-fuzzy controller. The basic mathematical models of each of the five layers neuro-fuzzy controller. Block diagram of genetic algorithm and feature matching.
??????, добавлен 21.06.2016?????? Data Mining: ???????????? ? ????????????????, ????????????? ? ?????????, ?????? ????????????? ??????, ?????????????. ???????????? ?????????? Data Mining. ??????????? ???????? ??????, ???? ?????????? ????????????????. ??????? ??????????? ??????.
???????????, добавлен 27.04.2023Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.
??????, добавлен 08.06.2024The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
??????, добавлен 04.10.2022A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
?????, добавлен 08.03.2014??????? ?????????? Data Mining, ?? ??????? ????????. ??????? ??????????? ??????? ??? ???????????? ??????? OLAP ? Data Mining. ????? ?????, ????????? ? ?????. ?????????????? ???????? ??????-????????: ????????? ????????, ???????????????, ???????????.
???????, добавлен 30.04.2014???? ?????????? Data Mining - ??????????? ? ????? ???????????????, ??? ?? ?????? ???? ???????? ???????????? ????????. ???? ??????? (??????????? ?? ???????). ???????????? ??????? ? ?????????? Data Mining ??? ???????? ???????. ???????????? ?????? ?? ???.
???????, добавлен 22.07.2017Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
??????, добавлен 22.12.2016The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
??????, добавлен 15.06.2012Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
??????, добавлен 27.05.2021Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
??????, добавлен 18.09.2020
