نتایج جستجو برای: binning

تعداد نتایج: 1482  

2000
M. A. Greenspan Michael Greenspan Guy Godin Jimmy Talbot

A new solution method to the Nearest Neighbour Problem is presented. The method is based upon the triangle inequality and works well for small point sets, where traditional solutions are particularly ineffective. Its performance is characterized experimentally and compared with k-d tree and Elias approaches. A hybrid approach is proposed wherein the triangle inequality method is applied to the ...

Journal: :International Journal of Computer Applications 2014

Journal: :Lecture Notes in Computer Science 2022

The reconstruction of microbial genomes from large metagenomic datasets is a critical procedure for finding uncultivated populations and defining their functional roles. To achieve that, we need to perform binning, clustering the assembled contigs into draft genomes. Despite existing computational tools, most them neglect one important property data, that is, noise. further improve binning step...

Journal: :Scientific reports 2016
Hsin-Hung Lin Yu-Chieh Liao

Metagenomics, the application of shotgun sequencing, facilitates the reconstruction of the genomes of individual species from natural environments. A major challenge in the genome recovery domain is to agglomerate or 'bin' sequences assembled from metagenomic reads into individual groups. Metagenomic binning without consideration of reference sequences enables the comprehensive discovery of new...

2012
Isaam Saeed Sen-Lin Tang Saman K. Halgamuge

An approach to infer the unknown microbial population structure within a metagenome is to cluster nucleotide sequences based on common patterns in base composition, otherwise referred to as binning. When functional roles are assigned to the identified populations, a deeper understanding of microbial communities can be attained, more so than gene-centric approaches that explore overall functiona...

Journal: :CoRR 2009
Ghadamali Bagherikaram Abolfazl S. Motahari Amir K. Khandani

In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages to two receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by the equivocation ra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید