The accurate classification of protein structure is critical and essential for protein function determination in Bioinformatics and Proteomics. A reasonably high rate of prediction accuracy for protein structure class...
详细信息
The accurate classification of protein structure is critical and essential for protein function determination in Bioinformatics and Proteomics. A reasonably high rate of prediction accuracy for protein structure classification has been achieved recently in coarse-grained protein class assignment according to their primary amino acid sequences, such as classifying proteins into four classes in SCOP. However, it is still quite a challenge for fine-grained protein fold assignment, especially when the number of possible folding patterns as those defined in SCOP is large. In our previous work, hierarchical learning architecture (HLA) neural networks have been used to differentiate proteins according to their classes and folding patterns. A better prediction accuracy rate for 27 folding categories was 65.5% which improves previous results by Ding and Dubchak with 56.5% prediction accuracy rate. The success of the protein structure classification depends heavily on the computational methods used and the features selected. Here combinatorial fusion analysis (CFA) techniques are used to facilitate feature selection and combination for improving prediction accuracy rate of protein structure classification. The resulting classification has an overall prediction accuracy rate of 87.8% for coarse-grained 4 classes and 70.9% for fine-grained 27 folding categories by applying the concept of CFA to our previous work using neural network with the HLA framework. These results are significantly higher than others and our previous work. They further demonstrate that the CFA techniques can greatly enhance the machine learning method (such as NN in the paper) in the protein structure prediction problem.
in this paper, the design of a fault detection filter for nonlinear systems is presented. The nonlinear system is represented as a sequence of linear time- varying approximations and at each linear approximation the d...
详细信息
This paper deals with motion generation algorithm considering the external and internal impulses. Initially, we analyze the trend of the impulses with a simple 3-DOF planar robot arm in various contact positions and p...
详细信息
An investigated object -with "poor" signal or lacking in the completed model information is referred to as a grey system. Grey systems are found everywhere. In this paper, the latest researches on "poor...
详细信息
An environment is a very complex and large system. This paper describes it with the aid of the grey systems approach. Firstly, the grey system and grey process are outlined, then the latest researches on grey predicti...
详细信息
We present a receding horizon control algorithm for compensation of backlash at the input of a stable linear system under control rate constraints. The problem is first posed as a receding horizon optimal control prob...
详细信息
Preventative diagnosis and maintenance of transformers has become more popular in recent times in order to improve the reliability of electric power systems. A number of transformers have recently been tested using Re...
详细信息
Summary form only given. A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem among a set of...
详细信息
Summary form only given. A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem among a set of channels. The purpose of using the Chinese Remainder Theorem is to hide the cipher text in order to increase the difficulty of attacking the cipher. The proposed scheme assumes the existence of a set of transmission channels between the sender and the receiver parties from which S channels are chosen using some selection criteria. The message is divided into as set of blocks of a size that is a multiple of the size of the underlying block cipher block size. The resulting N bit encrypted block is used as an N-bits integer. This integer remainders with respect to S selected relatively prime numbers are sent over the S selected channels. On the receiver side the inverse Chinese remainder is applied to get the encrypted blocks followed by a decryption operation to construct the original message. The theory, implementation and the security of this scheme are described in the paper.
The paper considers a set-membership joint estimation of variables and parameters in complex dynamic networks based on parametric uncertain models and limited hard measurements. The recursive estimation algorithm with...
详细信息
In this paper, we present the use of the wavelet transform for image object detection. We decompose image into first level subbands and remove the approximation subband. Inverse wavelet transform gives us an image wit...
详细信息
暂无评论