• Nenhum resultado encontrado

[PDF] Top 20 Is a genome a codeword of an error-correcting code?

Has 10000 "Is a genome a codeword of an error-correcting code?" found on our website. Below are the top 20 most common "Is a genome a codeword of an error-correcting code?".

Is a genome a codeword of an error-correcting code?

Is a genome a codeword of an error-correcting code?

... a genome is a discrete sequence, the elements of which belong to a set of four letters, the question as to whether or not there is an error-correcting code ... See full document

9

Viral Genome-Linked Protein (VPg) Is Essential for Translation Initiation of Rabbit Hemorrhagic Disease Virus (RHDV).

Viral Genome-Linked Protein (VPg) Is Essential for Translation Initiation of Rabbit Hemorrhagic Disease Virus (RHDV).

... (NCR) of the viral genome. The 5 0 UTR of caliciviruses is significantly shorter than Fig ...all of the groups were transfected with ... See full document

13

Origin of an alternative genetic code in the extremely small and GC-rich genome of a bacterial symbiont.

Origin of an alternative genetic code in the extremely small and GC-rich genome of a bacterial symbiont.

... lines of evidence support this idea, including a correlation between genome GC content and the types of DNA polymerase III, a subunit (DnaE) encoded in a genome [41] and the discovery ... See full document

11

Tetrahedral gray code for visualization of genome information.

Tetrahedral gray code for visualization of genome information.

... surface of the generator represents a unique nucleotide. An important feature of the generator is that the nucleotides corresponding to the two cells bordering each other on an edge are ... See full document

10

Extensive error in the number of genes inferred from draft genome assemblies.

Extensive error in the number of genes inferred from draft genome assemblies.

... cause of under-estimation is simply that genes may not be represented in low-coverage genomes due to a large number of gaps ...size of individual gene families may be severely underestimated, ... See full document

9

Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment

Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment

... combination of spread spectrum modulation, error correcting code, diversity and decoding method for better ...performance. An intelligent jammer usually reduces the effectiveness ... See full document

4

Test case reduction by using fuzzy clustering with new measure similarity

Test case reduction by using fuzzy clustering with new measure similarity

... testing is one of the most important and expensive software development life ...testing of software testing resulted from putting the different components together in order to examine the efficiency ... See full document

11

Deblurring, Localization and Geometry Correction of 2D QR Bar  Codes Using Richardson Lucy Method

Deblurring, Localization and Geometry Correction of 2D QR Bar Codes Using Richardson Lucy Method

... values of Len and Theta and in this way we collect a database of 50 images and passed it through our script in vision ...images is 14.1secs. We observe that most of the computing time ... See full document

6

SECURE REMOTE CLIENT AUTHENTICATION

SECURE REMOTE CLIENT AUTHENTICATION

... pages. An attacker, might, for example, hijack a well-known financial institution’s trusted brand and trick users into entering their authentication credentials (such as a one-time code) into a faked Web ... See full document

7

Rev. IBRACON Estrut. Mater.  vol.9 número3

Rev. IBRACON Estrut. Mater. vol.9 número3

... elements of a tunnel. The viscoplastic law of Perzyna represents the rockmass ...precast, is modeled as a viscoelastic material through the Maxwell and Kelvin chain ...ANSYS code. The method ... See full document

11

Comment-based Keyword Programming

Comment-based Keyword Programming

... programming is a technique to generate code fragments automatically from the several keywords pro- vided by the user and the context of the ...burden of remembering the details of a ... See full document

5

Teacher feedback and learners’ uptake

Teacher feedback and learners’ uptake

... part of some linguists who study the kind of interaction, which takes place in classrooms and how this affects the kind of language learners are exposed ...are of a much smaller range and ... See full document

16

Automatic design of decision-tree induction algorithms tailored to flexible-receptor docking data

Automatic design of decision-tree induction algorithms tailored to flexible-receptor docking data

... problem of RDD with flexible-receptor docking ...execution of HEAD-DT, instead of multiple runs — one for each data ...cost of applying the evolved algorithm in new data sets is very ... See full document

14

SOCIAL ECONOMY – A FORM OF INCLUSION AND OF ''REACTIVATING'' OF LABOR IN THE CONTEXT OF THE CURRENT CRISIS

SOCIAL ECONOMY – A FORM OF INCLUSION AND OF ''REACTIVATING'' OF LABOR IN THE CONTEXT OF THE CURRENT CRISIS

... The cultivating, through different social policies, especially through the ideologization of the values , of the contempt for the real, productive work represents a major problem. Only one country in the ... See full document

13

Is ‘msonge’ a house? Visualizing a novel in the L2 classroom: The case of Swahili

Is ‘msonge’ a house? Visualizing a novel in the L2 classroom: The case of Swahili

... English is the official language in the Swahili speaking re- gion of East Africa, it is learned as a foreign language (L2) by the ma- jority of its East African ...Swahili is learnt and ... See full document

15

The similarity solution of the longitudinal dispersion phenomenon of miscible fluids in porous media

The similarity solution of the longitudinal dispersion phenomenon of miscible fluids in porous media

... discussion of miscible displacement. This type of displacement has been of great concern to hydrologists who have been studying the problem of displacement of fresh water by sea water ... See full document

6

Design of tch-type sequences for communications

Design of tch-type sequences for communications

... synchronization is the procedure by which the receiver replicates the local carrier with the same frequency and phase than that found in the received ...that, is coherent operation ...signal is ... See full document

205

Verification against perturbed analyses and observations

Verification against perturbed analyses and observations

... verification of a fore- cast against the sequence of analyses used to produce those forecasts can under-estimate the magnitude of forecast er- ...cation of a short-range forecast against a ... See full document

9

Determination of Reliability Index and Weibull Modulus as a Measure of Hypereutectic Silumins Survival

Determination of Reliability Index and Weibull Modulus as a Measure of Hypereutectic Silumins Survival

... counterpart of the above mentioned alloys can be the silumin containing about 17% Si, with additions of 3% Cu, 1,5% Ni and 1,5% ...context, of particular significance are the methods determining the ... See full document

4

Qualitative behavior of an anti-competitive system of third-order rational difference equations

Qualitative behavior of an anti-competitive system of third-order rational difference equations

... intervals of real numbers. Furthermore, a solution , ∞ of system (2) is uniquely determined by initial conditions , for , , .... An equilibrium point of system (2) is a point , ... See full document

12

Show all 10000 documents...