نتایج جستجو برای: signature sequence

تعداد نتایج: 468007  

2003
Wolfgang Lück Thomas Schick

Let Γ be a group together with a sequence of normal subgroups Γ ⊃ Γ1 ⊃ Γ2 ⊃ . . . of finite index [Γ : Γk] such that T k Γk = {1}. Let (X,Y ) be a (compact) 4n-dimensional Poincaré pair and p : (X,Y )→ (X,Y ) be a Γ-covering, i.e. normal covering with Γ as deck transformation group. We get associated Γ/Γk-coverings (Xk, Yk)→ (X,Y ). We prove that sign(X,Y ) = lim k→∞ sign(Xk, Yk) [Γ : Γk] , whe...

Journal: :Biology letters 2013
Joel Smith Marcus R Kronforst

Hybridization has the potential to transfer beneficial alleles across species boundaries, and there are a growing number of examples in which this has apparently occurred. Recent studies suggest that Heliconius butterflies have transferred wing pattern mimicry alleles between species via hybridization, but ancestral polymorphism could also produce a signature of shared ancestry around mimicry g...

2001
Emilios Cambouropoulos

In this paper a computational model is described that transcribes polyphonic MIDI pitch files into the Western traditional music notation. Input to the proposed algorithm input is merely a sequence of MIDI pitch numbers in the order they appear in a MIDI file. No a priori knowledge is required such as key signature, tonal centers, time signature, voice separation and so on. Output of the algori...

2013
Susana Merino Yuriy A. Knirel Miguel Regué Juan M. Tomás

We experimentally identified the activities of six predicted heptosyltransferases in Actinobacillus pleuropneumoniae genome serotype 5b strain L20 and serotype 3 strain JL03. The initial identification was based on a bioinformatic analysis of the amino acid similarity between these putative heptosyltrasferases with others of known function from enteric bacteria and Aeromonas. The putative funct...

1995
Javier Rodríguez Fonollosa José A. R. Fonollosa Zoran Zvonar Josep Vidal

Multiuser detection in Code Division Multiple Access systems usually requires either knowledge of the transmitted signature sequences and channel state information or use of a known training sequence for adaptation. In this paper we develop a scheme that can be employed for the joint adaptive blind multiuser identification and detection in asynchronous CDMA systems. This scheme relies on a mult...

2007
Noel D. McCarthy Frances M. Colles Kate E. Dingle Mary C. Bagnall Georgina Manning Martin C.J. Maiden Daniel Falush

Host association of Campylobacter jejuni was analyzed by using multilocus sequence typing data for 713 isolates from chickens and bovids (cattle and sheep). Commonly used summary measures of genotypes (sequence type and clonal complex) showed poor accuracy, but a method using the full allelic profile showed 80% accuracy in distinguishing isolates from these 2 host groups. We explored the biolog...

Journal: :Int. J. Computational Intelligence Systems 2011
Bozena Malysiak-Mrozek Dariusz Mrozek

Describing protein structures in terms of their energy features can be a key to understand how proteins work and interact to each other in cellular reactions. This can be also a base to compare proteins and search protein similarities. In the paper, we present protein comparison by the alignment of protein energy signatures. In the alignment, components of energy signatures are represented as f...

2012
Jiangning Song Hao Tan Mingjun Wang Geoffrey I. Webb Tatsuya Akutsu

Protein backbone torsion angles (Phi) and (Psi) involve two rotation angles rotating around the C(α)-N bond (Phi) and the C(α)-C bond (Psi). Due to the planarity of the linked rigid peptide bonds, these two angles can essentially determine the backbone geometry of proteins. Accordingly, the accurate prediction of protein backbone torsion angle from sequence information can assist the prediction...

1997
Mihir Bellare Shafi Goldwasser Daniele Micciancio

The DSS signature algorithm requires the signer to generate a new random number with every signature. We show that if random numbers for DSS are generated using a linear congruential pseudorandom number generator (LCG) then the secret key can be quickly recovered after seeing a few signatures. This illustrates the high vulnerability of the DSS to weaknesses in the underlying random number gener...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید