نتایج جستجو برای: signature sequence

تعداد نتایج: 468007  

Journal: :Molecular Biology and Evolution 2008
Bas E. Dutilh Berend Snel Thijs J. G. Ettema Martijn A. Huynen

Gene content has been shown to contain a strong phylogenetic signal, yet its usage for phylogenetic questions is hampered by horizontal gene transfer and parallel gene loss and until now required completely sequenced genomes. Here, we introduce an approach that allows the phylogenetic signal in gene content to be applied to any set of sequences, using signature genes for phylogenetic classifica...

2004
A. Nallanathan T. S. Ng

In this paper, we describe a Generalized Lapped Transform (GLT) based high-speed transmission technique for wireless mobile communications over Rayleigh fading channel. In this technique, the high-rate data bits are serial-to-parallel converted into low-rate data streams which are then modulated by the GLT based signature sequences. Numerical results show that the GLT based system gives better ...

In CDMA (Code - Division Multiple - Access) systems multi - user accessing of a channel is possible. Under the assumptions of Optimum multi - user and decorrelating detector in CDMA systems. By using signals with zero and / or identical cross correlations, a simple and expandable decorrelating detector with optimum efficiency which can be easily implemented are proposed. Constructing these sign...

Journal: :Journal of molecular biology 2001
E Sprinzak H Margalit

As protein-protein interaction is intrinsic to most cellular processes, the ability to predict which proteins in the cell interact can aid significantly in identifying the function of newly discovered proteins, and in understanding the molecular networks they participate in. Here we demonstrate that characteristic pairs of sequence-signatures can be learned from a database of experimentally det...

2015
Mohammad Amjad

Now a days digital signature schemes stress on secure, authentication and verification mechanism of electronic signature used in electronic transaction system. In this sequence proxy digital signature may play an important role to achieve the security goals. Proxy Digital signature is the process of authorized signatory of the document by one person on behalf of other one. None of the proxy sig...

Journal: :IEEE Trans. Communications 1998
Karen W. Halford Maïté Brandt-Pearce

We present three Detector/Estimators (DEs) which allow multiuser detection and parameter estimation without a side channel in a dynamic asynchronous CDMA system in which users are entering and leaving the system. These DEs optimally detect a new user given only the chip rate and the spreading factor of the new user. Two of these DEs, the Maximum Likelihood Detector/Estimator (MLDE) and Generali...

Journal: :journal of advances in computer research 2013
mohammad mohammadzade alireza ghonodi

the problem of automatic signature recognition has received little attention incomparison with the problem of signature verification, despite its potentialapplications for many business processes and can be used effectively in paperlessoffice projects. this paper presents model-based off-line signature recognition withrotation invariant features. non-linear rotation of signature patterns is one...

2016
Kim Vriens Steve Peigneur Barbara De Coninck Jan Tytgat Bruno P. A. Cammue Karin Thevissen

Scorpion toxins that block potassium channels and antimicrobial plant defensins share a common structural CSαβ-motif. These toxins contain a toxin signature (K-C4-X-N) in their amino acid sequence, and based on in silico analysis of 18 plant defensin sequences, we noted the presence of a toxin signature (K-C5-R-G) in the amino acid sequence of the Arabidopsis thaliana defensin AtPDF2.3. We foun...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1997
S Karlin J Mrázek

Eukaryotic genome similarity relationships are inferred using sequence information derived from large aggregates of genomic sequences. Comparisons within and between species sample sequences are based on the profile of dinucleotide relative abundance values (The profile is rho*XY = f*XY/f*Xf*Y for all XY, where f*X denotes the frequency of the nucleotide X and f*XY denotes the frequency of the ...

Journal: :IACR Cryptology ePrint Archive 2014
Ahto Buldas Risto Laanoja Ahto Truu

We present new ideas for decreasing the size of secure memory needed for hardware implementations of hash-sequence based signatures proposed recently by Buldas, Laanoja and Truu (in the following referred to as BLT). In their scheme, a message m is signed by time-stamping a concatenation m‖zt of the message and the one-time pseudo-random password zt intended to sign messages at a particular tim...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید