Discovering evolutionary hidden treasures

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Discovering Hidden Evidence Discovering Hidden Evidence

Discovering Hidden Evidence C. Hosmer Chet Hosmer WetStone Technologies, Inc., Cortland, New York, USA ABSTRACT Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. In addition, new information suggests that the download of an arsenal of software tools that perform these...

متن کامل

MaSyMoS: Finding Hidden Treasures in Model Repositories

Ensuring reproducibility of simulation studies in computational biology poses a challenge to data management solutions. One specific problem is the organisation and linking of all files related to a simulation study at the storage level. Such a study comprises of a number of files, and additional links to third party resources. MaSyMoS is a graph-based approach to representing the links between...

متن کامل

Hidden Treasures in unspliced EST data Masterarbeit

Acknowledgment I would like to thank everybody who helped me during my study and writing of this thesis. Special thanks goes to my supervisor Peter for being the most knowledgeable person I ever met and also for always supporting my funny ideas. Another great help with everything I had to do in the last years was Sonja. My family has been greatly supportive and patient. My working room mates, S...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

Discovering hidden viral piracy

MOTIVATION Viruses and developers of anti-inflammatory therapies share a common interest in proteins that manipulate the immune response. Large double-stranded DNA viruses acquire host proteins to evade host defense mechanisms. Hence, viral pirated proteins may have a therapeutic potential. Although dozens of viral piracy events have already been identified, we hypothesized that sequence diverg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Computational Science

سال: 2021

ISSN: 2662-8457

DOI: 10.1038/s43588-020-00004-9