PCA and K-Means Decipher Genome
How data visualization can help in genomic sequence analysis. The fragment of genetic text of a bacterial genome and analyzing its structure. The information in the genome encoded by non-overlapping triplets. Finding out the real gene positions.
Подобные документы
Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016The weather forecast from a scientific point of view as one of the most complex problems of atmospheric physics. General characteristics of the big data forecasting system using the similarity method. Features of using big data for digitization.
дипломная работа, добавлен 13.07.2020On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brutе force algorithm.
учебное пособие, добавлен 26.08.2016Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.
дипломная работа, добавлен 30.08.2016Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.
статья, добавлен 19.09.2024The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.
учебное пособие, добавлен 25.11.2013Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.
статья, добавлен 28.09.2016Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.
статья, добавлен 14.07.2016Обеспечение функционального покрытия бизнес-требований на сервисно-ориентированной архитектуре. Изучение парадигмы построения корпоративных информационных систем по технологии in-memory data management. Продвижение продуктов по программе импортозамещения.
доклад, добавлен 13.07.2017- 113. Representing Complex Data Using Localized Principal Components with Application to Astronomical Data
Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.
учебное пособие, добавлен 08.02.2013 - 114. NLP "recipes" for text corpora: approaches to computing the probability of a sequence of tokens
Natural Language Processing as a subfield of computer science and artificial intelligence is concerned with interactions between computers and human languages. The purpose of this paper, is to outline the linguistic and NLP methods for textual processing.
статья, добавлен 18.05.2022 Применение методов классификации, моделирования и прогнозирования, основанных на применении деревьев решений, искусственных нейронных сетей, генетических алгоритмов, эволюционного программирования. Задачи и возможности Data Miner в Statistica 8.
реферат, добавлен 19.12.2014Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.
книга, добавлен 08.03.2014This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.
статья, добавлен 26.10.2020Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
статья, добавлен 12.08.2016- 120. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.
статья, добавлен 08.02.2013- 122. Применение алгоритмов кластеризации k-means и g-means в задачах распознавания воздушных объектов
Характеристика процесса распознавания воздушных объектов, который имеет ряд трудностей. Анализ использования кластеризации семействами алгоритмов k-means и g-means. Исследование работоспособности метода на примере информации о воздушных объектах.
статья, добавлен 30.04.2018 This publication explores the benefits of adopting an event-driven architecture in microservices and delves into how events can be effectively used for inter-process communication and data synchronization. By leveraging events as a means of communication.
статья, добавлен 08.12.2024Пошук шляхів досягнення конкурентних переваг та стабільності компаній на ринку. Визначення етапів впровадження та проблем використання Big Data в сучасному бізнесі. Забезпечення конфіденційності при зберіганні, обробці й аналізі великих обсягів даних.
статья, добавлен 18.06.2024Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
книга, добавлен 08.03.2014