Correction: The Use of Weighted Graphs for Large-Scale Genome Analysis
ثبت نشده
چکیده
Figure 2 is erroneously cropped. Please view a complete version here. Figure 2. A example of weighted graph compression based on node weights. Node weights are in the parenthesis. Copyright: ß 2014 The PLOS ONE Staff. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
منابع مشابه
The Use of Weighted Graphs for Large-Scale Genome Analysis
There is an acute need for better tools to extract knowledge from the growing flood of sequence data. For example, thousands of complete genomes have been sequenced, and their metabolic networks inferred. Such data should enable a better understanding of evolution. However, most existing network analysis methods are based on pair-wise comparisons, and these do not scale to thousands of genomes....
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملLarge Scale Experiments Data Analysis for Estimation of Hydrodynamic Force Coefficients Part 1: Time Domain Analysis
This paper describes various time-domain methods useful for analyzing the experimental data obtained from a circular cylinder force in terms of both wave and current for estimation of the drag and inertia coefficients applicable to the Morison’s equation. An additional approach, weighted least squares method is also introduced. A set of data obtained from experiments on heavily roughened circul...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملThe braneworld stability and large-scale correction in graphene like background
In this work, we consider a graphene-like background in braneworld scenario which is one of the interesting models in cosmology and theoretical physics. Indeed, this paper is an application of holography in condense matter. We use the geometric form of potential which help to obtain field equations and solve it to obtain the energy spectrum. In that case we calculate superpotential and energy d...
متن کامل