Browse Results

Showing 46,001 through 46,025 of 61,781 results

Proportionate-type Normalized Least Mean Square Algorithms

by Milos Doroslovacki Kevin Wagner

The topic of this book is proportionate-type normalized least mean squares (PtNLMS) adaptive filtering algorithms, which attempt to estimate an unknown impulse response by adaptively giving gains proportionate to an estimate of the impulse response and the current measured error. These algorithms offer low computational complexity and fast convergence times for sparse impulse responses in network and acoustic echo cancellation applications. New PtNLMS algorithms are developed by choosing gains that optimize user-defined criteria, such as mean square error, at all times. PtNLMS algorithms are extended from real-valued signals to complex-valued signals. The computational complexity of the presented algorithms is examined. Contents 1. Introduction to PtNLMS Algorithms2. LMS Analysis Techniques3. PtNLMS Analysis Techniques4. Algorithms Designed Based on Minimization of User Defined Criteria5. Probability Density of WD for PtLMS Algorithms6. Adaptive Step-size PtNLMS Algorithms7. Complex PtNLMS Algorithms8. Computational Complexity for PtNLMS Algorithms About the Authors Kevin Wagner has been a physicist with the Radar Division of the Naval Research Laboratory, Washington, DC, USA since 2001. His research interests are in the area of adaptive signal processing and non-convex optimization.Milos Doroslovacki has been with the Department of Electrical and Computer Engineering at George Washington University, USA since 1995, where he is now an Associate Professor. His main research interests are in the fields of adaptive signal processing, communication signals and systems, discrete-time signal and system theory, and wavelets and their applications.

Propose, Prepare, Present: How to become a successful, effective, and popular speaker at industry conferences

by Alistair Croll

Every year, tens of thousands of companies—from industry giants to aspiring upstarts—apply to speak at conferences. They pump millions of dollars into these events, hoping to find new customers, strengthen their brand, and meet new partners. Sadly, for most of them, things don’t go that way. Submitted topics aren’t chosen; when they are, they come across as tone-deaf sales pitches.What does it take to be chosen to speak—and to rock the mic when given the chance? This book takes you behind-the-scenes of the conference process, showing you how to submit, plan, and deliver a talk that matters. Event organizer Alistair Croll provides many examples based on his experience with a wide range of conferences, including O’Reilly’s Strata, Velocity, Web2Expo, and TOC Conferences.Learn 11 items that help your submission stand out—and 11 items that will get it tossedExplore the hurdles your proposal has to clear before it’s acceptedTailor your talk to a conference’s topics and themesDiscover why images work better than words in your slide deckAchieve your business goals by engaging the audience before, during, and after your talk"We’ve been running successful events worldwide for over a decade, and the simple truth is that the people who get chosen, and give great presentations, follow the rules in this book."--Gina Blaber, VP Conferences, O’Reilly Media

Prospective Ergonomics

by André Liem

This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences, similarities and relationships between strategic design and prospective ergonomics are reviewed using existing theories and frameworks from design, ergonomics, and strategic and innovation management. To complement the theory, 12 cases have been analyzed in greater depth according to 4 main dimensions of analysis. Outcomes have shown that innovating through the Prospective Ergonomics (PE) approach is about finding the right balance between, on the one hand, meeting primary objectives such as profit maximization or solving the design problem, and on the other, acknowledging that human activity is bounded by rationality. This means that humans have diverse motives.

Protecting Children Online?: Cyberbullying Policies of Social Media Companies (The Information Society Series)

by Tijana Milosevic

A critical examination of efforts by social media companies—including Facebook, Twitter, Snapchat, and Instagram—to rein in cyberbullying by young users.High-profile cyberbullying cases often trigger exaggerated public concern about children's use of social media. Large companies like Facebook respond by pointing to their existing anti-bullying mechanisms or coordinate with nongovernmental organizations to organize anti-cyberbullying efforts. Do these attempts at self-regulation work? In this book, Tijana Milosevic examines the effectiveness of efforts by social media companies—including Facebook, Twitter, YouTube, Snapchat, and Instagram—to rein in cyberbullying by young users. Milosevic analyzes the anti-bullying policies of fourteen major social media companies, as recorded in companies' corporate documents, draws on interviews with company representatives and e-safety experts, and details the roles of nongovernmental organizations examining their ability to provide critical independent advice. She draws attention to lack of transparency in how companies handle bullying cases, emphasizing the need for a continuous independent evaluation of effectiveness of companies' mechanisms, especially from children's perspective. Milosevic argues that cyberbullying should be viewed in the context of children's rights and as part of the larger social problem of the culture of humiliation.Milosevic looks into five digital bullying cases related to suicides, examining the pressures on the social media companies involved, the nature of the public discussion, and subsequent government regulation that did not necessarily address the problem in a way that benefits children. She emphasizes the need not only for protection but also for participation and empowerment—for finding a way to protect the vulnerable while ensuring the child's right to participate in digital spaces.

Protecting Critical Infrastructures Against Cyber-Attack (Adelphi series)

by Stephen Lukasik

The threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Protecting Data Privacy in Health Services Research

by Institute of Medicine

The need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that we need to support informed choices depends on access to data, but at the same time, individual privacy and patient-health care provider confidentiality must be protected.

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment

by National Research Council of the National Academies

All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

Protecting Information Assets and IT Infrastructure in the Cloud

by Preston de Guise Ravi Das

Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.

Protecting Information Assets and IT Infrastructure in the Cloud

by Ravi Das

This book is a second edition. The last one reviewed the evolution of the Cloud, important Cloud concepts and terminology, and the threats that are posed on a daily basis to it. A deep dive into the components of Microsoft Azure were also provided, as well as risk mitigation strategies, and protecting data that resides in a Cloud environment. In this second edition, we extend this knowledge gained to discuss the concepts of Microsoft Azure. We also examine how Microsoft is playing a huge role in artificial intelligence and machine learning with its relationship with OpenAI. An overview into ChatGPT is also provided, along with a very serious discussion of the social implications for artificial intelligence.

Protecting Location Privacy in the Era of Big Data: A Technical Perspective

by Quan Z. Sheng Yan Yan Adnan Mahmood

This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.The growth of the mobile Internet and the popularity of smart devices have spurred the development of LBS and related mobile applications. However, the misuse of sensitive location data could compromise the physical and communication security of associated devices and nodes, potentially leading to privacy breaches. This book explores the potential risks to the location privacy of mobile users in the context of big data applications. It discusses the latest methods and implications of location privacy from different perspectives. The author offers case studies of three applications: statistical disclosure and privacy protection of location-based big data using a centralized differential privacy model; a user location perturbation mechanism based on a localized differential privacy model; and terminal location perturbation using a geo-indistinguishability model. Linking recent developments in three-dimensional positioning and artificial intelligence, the book also predicts future trends and provides insights into research issues in location privacy.This title will be a valuable resource for researchers, students, and professionals interested in location-based services, privacy computing and protection, wireless network security, and big data security.

Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust)

by Steven Furnell Jianying Zhou Xiapu Luo Weizhi Meng

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

Protecting National Security: A History of British Communications Investigation Regulation

by Phil Glover

This book contends that modern concerns surrounding the UK State’s investigation of communications (and, more recently, data), whether at rest or in transit, are in fact nothing new. It evidences how, whether using common law, the Royal Prerogative, or statutes to provide a lawful basis for a state practice traceable to at least 1324, the underlying policy rationale has always been that first publicly articulated in Cromwell’s initial Postage Act 1657, namely the protection of British ‘national security’, broadly construed. It further illustrates how developments in communications technology led to Executive assumptions of relevant investigatory powers, administered in conditions of relative secrecy. In demonstrating the key role played throughout history by communications service providers, the book also charts how the evolution of the UK Intelligence Community, entry into the ‘UKUSA’ communications intelligence-sharing agreement 1946, and intelligence community advocacy all significantly influenced the era of arguably disingenuous statutory governance of communications investigation between 1984 and 2016. The book illustrates how the 2013 ‘Intelligence Shock’ triggered by publication of Edward Snowden’s unauthorized disclosures impelled a transition from Executive secrecy and statutory disingenuousness to a more consultative, candid Executive and a policy of ‘transparent secrecy’, now reflected in the Investigatory Powers Act 2016. What the book ultimately demonstrates is that this latest comprehensive statute, whilst welcome for its candour, represents only the latest manifestation of the British state’s policy of ensuring protection of national security by granting powers enabling investigative access to communications and data, in transit or at rest, irrespective of location.

Protecting Oracle Database 12c

by Paul Wright

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation features of Oracle Database 12c without increasing risk of either internal corruption or external vulnerability. In addition, new protections not publicly available are included, so that you can see how demonstrable risk improvements can be achieved, measured, and reported through Enterprise Manager 12c. Most importantly, the challenge of privileged access control within a consolidation environment will be addressed, thus enabling a safe move to greater efficiency. What you'll learnOracle database security issues and how to defend against new risks introduced by Oracle Database 12c and pre-existing architectural vulnerabilities, such as incoming DBlinksControl and audit the use of SYS privilege over a large estate using native toolsUse Oracle native audit as an IPS to block threats in real-timeLeverage root segregation to secure Oracle DBSecure privileged access control and break-glass sessionsScale automated security controls through Enterprise Manager to a large estateImprove your ability to pass audits and stay compliantWho this book is for Protecting Oracle Database 12c is primarily aimed at Oracle database administrators, DBA managers, and security staff who are working to safely and securely implement Oracle Database 12c in their environment. The book especially targets those using privileged access control to enable consolidation and the new cloud features set, including it s multi-tenant database capabilities. Table of ContentsPART I. SECURITY OVERVIEW AND HISTORY1. Oracle Security History2. Current state of the Art3. Extrapolating Current TrendsPART II. DEFENSE COOKBOOK4. Managing Users in Oracle5. Oracle Vulnerability Scanner6. Centralized Native Auditing and IPS7. Pluggable Database PrimerPART III. SECURITY IN THE 12C RELEASE8. New Security Features in 12C9. Design Flaws, Fixed and Remaining in 12C10. New Security Issues in 12C11. Advanced Defenses and Forensic ResponsePART IV. SECURITY IN CONSOLIDATION12. Privileged Access Control Foundations 13. Privileged Access Control Methods 14. Securing Privileged Access Control Systems 15. Rootkit Checker and Security MonitoringPART V. ARCHITECTURAL RISK MANAGEMENT16. Oracle Security Architecture Foundations17. Enterprise Manager 12c As a Security Tool18. Defending Enterprise Manager 12c19. The Cloud and Privileged Access20. Management and Conclusions"

Protecting Privacy in Data Release

by Giovanni Livraga

This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsourcing and cloud computing situations. Private companies, public organizations and final users are releasing, sharing, and disseminating their data to take reciprocal advantage of the great benefits of making their data available to others. This book weighs these benefits against the potential privacy risks. A detailed analysis of recent techniques for privacy protection in data release and case studies illustrate crucial scenarios. Protecting Privacy in Data Release targets researchers, professionals and government employees working in security and privacy. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference.

Protecting Privacy through Homomorphic Encryption

by Kristin Lauter Wei Dai Kim Laine

This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research.The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.

Protecting Your Mobile App IP: The Mini Missing Manual

by Richard Stim

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do happen, you'll have the legal ammunition you need to recover your losses and, in some cases, get money to pay attorney fees. Taking these steps will also reinforce your legal rights in the event that another company wants to acquire your apps.The four methods include:Trade secret protection. Want to show your app to others -- investors, beta testers, or contractors -- before it's available to the public? Learn what trade secrets are and how you can protect them.Copyright protection. Protect your whole app as well as its individual parts, such as the underlying code, appearance, and the collection of data within it.Trademark protection. Protect your app's name, slogan, or logo. And learn how to file an application for trademark registration.Permissions. Learn how and when to get permission to reuse material from other sources, like photos, data, video, or audio clips.

Protecting and Mitigating Against Cyber Threats: Deploying Artificial Intelligence and Machine Learning

by Ming Yang Suneeta Satpathy Sachi Nandan Mohanty D. Khasim Vali

The book provides invaluable insights into the transformative role of AI and ML in security, offering essential strategies and real-world applications to effectively navigate the complex landscape of today’s cyber threats. Protecting and Mitigating Against Cyber Threats delves into the dynamic junction of artificial intelligence (AI) and machine learning (ML) within the domain of security solicitations. Through an exploration of the revolutionary possibilities of AI and ML technologies, this book seeks to disentangle the intricacies of today’s security concerns. There is a fundamental shift in the security soliciting landscape, driven by the extraordinary expansion of data and the constant evolution of cyber threat complexity. This shift calls for a novel strategy, and AI and ML show great promise for strengthening digital defenses. This volume offers a thorough examination, breaking down the concepts and real-world uses of this cutting-edge technology by integrating knowledge from cybersecurity, computer science, and related topics. It bridges the gap between theory and application by looking at real-world case studies and providing useful examples. Protecting and Mitigating Against Cyber Threats provides a roadmap for navigating the changing threat landscape by explaining the current state of AI and ML in security solicitations and projecting forthcoming developments, bringing readers through the unexplored realms of AI and ML applications in protecting digital ecosystems, as the need for efficient security solutions grows. It is a pertinent addition to the multi-disciplinary discussion influencing cybersecurity and digital resilience in the future. Readers will find in this book: Provides comprehensive coverage on various aspects of security solicitations, ranging from theoretical foundations to practical applications; Includes real-world case studies and examples to illustrate how AI and machine learning technologies are currently utilized in security solicitations; Explores and discusses emerging trends at the intersection of AI, machine learning, and security solicitations, including topics like threat detection, fraud prevention, risk analysis, and more; Highlights the growing importance of AI and machine learning in security contexts and discusses the demand for knowledge in this area. Audience Cybersecurity professionals, researchers, academics, industry professionals, technology enthusiasts, policymakers, and strategists interested in the dynamic intersection of artificial intelligence (AI), machine learning (ML), and cybersecurity.

Protection of Information and the Right to Privacy - A New Equilibrium?

by Luciano Floridi

This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude ("more of the same") nor a revolutionary zeal ("never seen before") is likely to lead to satisfactory solutions. Instead, more reflection and better conceptual design are needed, not least to harmonise different perspectives and legal frameworks internationally. The focus of the book is on how we may reconcile high levels of information security with robust degrees of informational privacy, also in connection with recent challenges presented by phenomena such as "big data" and security scandals, as well as new legislation initiatives, such as those concerning "the right to be forgotten" and the use of personal data in biomedical research. The book seeks to offer analyses and solutions of the new tensions, in order to build a fair, shareable and sustainable balance in this vital area of human interactions.

Protective Relaying: Theory and Applications

by Walter A. Elmore

Targeting the latest microprocessor technologies for more sophisticated applications in the field of power system short circuit detection, this revised and updated source imparts fundamental concepts and breakthrough science for the isolation of faulty equipment and minimization of damage in power system apparatus. The Second Edition clearly descri

Protective Security: Creating Military-Grade Defenses for Your Digital Business

by Jim Seaman

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised: cyberattack, data breach, system outage, pandemic, natural disaster, and many more. Rather than being compliance-concentric, this book focuses on how your business can identify the assets that are most valuable to your organization and the threat vectors associated with these assets. You will learn how to apply appropriate mitigation controls to reduce the risks within suitable tolerances. You will gain a comprehensive understanding of the value that effective protective security provides and how to develop an effective strategy for your type of business. What You Will Learn Take a deep dive into legal and regulatory perspectives and how an effective protective security strategy can help fulfill these ever-changing requirementsKnow where compliance fits into a company-wide protective security strategySecure your digital footprintBuild effective 5 D network architectures: Defend, detect, delay, disrupt, deterSecure manufacturing environments to balance a minimal impact on productivitySecuring your supply chains and the measures needed to ensure that risks are minimizedWho This Book Is For Business owners, C-suite, information security practitioners, CISOs, cybersecurity practitioners, risk managers, IT operations managers, IT auditors, and military enthusiasts

Protein Bioinformatics (Methods in Molecular Biology #2836)

by Frédérique Lisacek

This detailed volume explores techniques for protein bioinformatics research, including databases, software tools, and computational methods, in the context of protein science or proteomics and opening to other omics areas. Beginning with a section on proteogenomics, the book continues by covering posttranslational modifications, processing large-scale mass spectrometry data, protein structure and interactions, as well as protein feature inference. Written for the highly successful Methods in Molecular Biology series, chapters include the kind of detailed implementation advice to ensure efficacious results. Authoritative and practical, Protein Bioinformatics serves as an ideal guide for researchers in disciplines encompassing the biotechnological, pharmaceutical, biological, and medical sciences, as well as the computational and engineering sciences.

Protein Bioinformatics: From Protein Modifications and Networks to Proteomics (Methods in Molecular Biology #1558)

by Cathy H. Wu Cecilia N. Arighi Karen E. Ross

This volume introduces bioinformatics research methods for proteins, with special focus on protein post-translational modifications (PTMs) and networks. This book is organized into four parts and covers the basic framework and major resources for analysis of protein sequence, structure, and function; approaches and resources for analysis of protein PTMs, protein-protein interactions (PPIs) and protein networks, including tools for PPI prediction and approaches for the construction of PPI and PTM networks; and bioinformatics approaches in proteomics, including computational methods for mass spectrometry-based proteomics and integrative analysis for alternative splice isoforms, for functional discovery. Written in the highly successful Methods in Molecular Biology series format, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory or computational protocols, and tips on troubleshooting and avoiding known pitfalls.Cutting-edge and thorough, Protein Bioinformatics: From Protein Modifications and Networks to Proteomics is a valuable resource for readers who wish to learn about state-of-the-art bioinformatics databases and tools, novel computational methods, and future trends in protein and proteomic data analysis in systems biology. This book is useful to researchers who work in the biotechnology and pharmaceutical industries, and in various academic departments, such as biological and medical sciences and computer sciences and engineering.

Protein Families

by Alex Bateman Vladimir Uversky Christine Orengo

New insights into the evolution and nature of proteinsExploring several distinct approaches, this book describes the methods for comparing protein sequences and protein structures in order to identify homologous relationships and classify proteins and protein domains into evolutionary families. Readers will discover the common features as well as the key philosophical differences underlying the major protein classification systems, including Pfam, Panther, SCOP, and CATH. Moreover, they'll discover how these systems can be used to understand the evolution of protein families as well as understand and predict the degree to which structural and functional information are shared between relatives in a protein family.Edited and authored by leading international experts, Protein Families offers new insights into protein families that are important to medical research as well as protein families that help us understand biological systems and key biological processes such as cell signaling and the immune response. The book is divided into three sections: Section I: Concepts Underlying Protein Family Classification reviews the major strategies for identifying homologous proteins and classifying them into families. Section II: In-Depth Reviews of Protein Families focuses on some fascinating super protein families for which we have substantial amounts of sequence, structural and functional data, making it possible to trace the emergence of functionally diverse relatives. Section III: Review of Protein Families in Important Biological Systems examines protein families associated with a particular biological theme, such as the cytoskeleton.All chapters are extensively illustrated, including depictions of evolutionary relationships. References at the end of each chapter guide readers to original research papers and reviews in the field.Covering protein family classification systems alongside detailed descriptions of select protein families, this book offers biochemists, molecular biologists, protein scientists, structural biologists, and bioinformaticians new insight into the evolution and nature of proteins.

Protein Function Prediction

by Daisuke Kihara

Gene function annotation has been a central question in molecular biology. The importance of computational function prediction is increasing because more and more large scale biological data, including genome sequences, protein structures, protein-protein interaction data, microarray expression data, and mass spectrometry data, are awaiting biological interpretation. Traditionally when a genome is sequenced, function annotation of genes is done by homology search methods, such as BLAST or FASTA. However, since these methods are developed before the genomics era, conventional use of them is not necessarily most suitable for analyzing a large scale data. Therefore we observe emerging development of computational gene function prediction methods, which are targeted to analyze large scale data, and also those which use such omics data as additional source of function prediction. In this book, we overview this emerging exciting field. The authors have been selected from 1) those who develop novel purely computational methods 2) those who develop function prediction methods which use omics data 3) those who maintain and update data base of function annotation of particular model organisms (E. coli), which are frequently referred

Protein Homology Detection Through Alignment of Markov Random Fields

by Jinbo Xu Sheng Wang Jianzhu Ma

This work covers sequence-based protein homology detection, a fundamental and challenging bioinformatics problem with a variety of real-world applications. The text first surveys a few popular homology detection methods, such as Position-Specific Scoring Matrix (PSSM) and Hidden Markov Model (HMM) based methods, and then describes a novel Markov Random Fields (MRF) based method developed by the authors. MRF-based methods are much more sensitive than HMM- and PSSM-based methods for remote homolog detection and fold recognition, as MRFs can model long-range residue-residue interaction. The text also describes the installation, usage and result interpretation of programs implementing the MRF-based method.

Refine Search

Showing 46,001 through 46,025 of 61,781 results