Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Qing-xin Zhu"'
Publikováno v:
Sensors & Transducers, Vol 162, Iss 1, Pp 233-237 (2014)
The computational discovery of DNA motifs for previously uncharacterized transcription factors in groups of co-regulated genes is a well-studied problem with a great deal of practical relevance to the biologist. In this paper, we applied an improved
Externí odkaz:
https://doaj.org/article/a3013ebb44c040a494edbde1a83db540
Publikováno v:
Evolutionary Bioinformatics, Vol 2009, Iss 5, Pp 137-146 (2010)
The sizes of the protein databases are growing rapidly nowadays, thus it becomes increasingly important to cluster protein sequences only based on sequence information. In this paper we improve the similarity measure proposed by Kelil et al, then clu
Externí odkaz:
https://doaj.org/article/299828ed143d4417bc8a8d39d0021e0d
Publikováno v:
Evolutionary Bioinformatics, Vol 5 (2009)
The sizes of the protein databases are growing rapidly nowadays, thus it becomes increasingly important to cluster protein sequences only based on sequence information. In this paper we improve the similarity measure proposed by Kelil et al, then clu
Externí odkaz:
https://doaj.org/article/da885a9a72334176864451e2acced0f0
Publikováno v:
Journal of Computer Applications. 32:3107-3111
Publikováno v:
Journal of Software. 22:1827-1837
Edge detection for highly distorted images suffering Gaussian noise based on improve Canny algorithm
Publikováno v:
Kybernetes. 40:883-893
PurposeThe purpose of this paper is to detect edge of image in high noise level, suffering Gaussian noise.Design/methodology/approachCanny edge detection algorithm performs poorly when applied to highly distorted images suffering from Gaussian noise.
Autor:
Yong Cao, Qing-Xin Zhu
Publikováno v:
Information Technology Journal. 9:349-353
Publikováno v:
Computers & Security. 25:469-473
Infection is an essential character of computer viruses. In addition, computer viruses can also imitate the behavior of infected programs in some ways in order to hide themselves. In this paper we define infection and imitation mathematically, and cl
Publikováno v:
IEEE Transactions on Information Theory. 51:2962-2966
Computer viruses can disable computer systems not only by destroying data or modifying a system's configuration, but also by consuming most of the computing resources such as CPU time and storage. The latter effects are related to the computational c
Publikováno v:
2009 Fourth International on Conference on Bio-Inspired Computing.
With the development of sequencing technologies, more and more protein sequences are uncharacterized. Clustering protein sequences into homologous groups can help to annotate uncharacterized protein sequences. In recent years, many clustering algorit