Search
Now showing items 1-10 of 46
Using the Sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem
(
Hindawi
, 2014 , Article)
The all-pairs suffix-prefix matching problem is a basic problem in string processing. It has an application in the de novo genome assembly task, which is one of the major bioinformatics problems. Due to the large size of ...
Assessing the effects of data selection and representation on the development of reliable E. coli sigma 70 promoter region predictors
(
Public Library of Science
, 2015 , Article)
As the number of sequenced bacterial genomes increases, the need for rapid and reliable tools for the annotation of functional elements (e.g., transcriptional regulatory elements) becomes more desirable. Promoters are the ...
A Practical and Scalable Tool to Find Overlaps between Sequences
(
Hindawi
, 2015 , Article)
The evolution of the next generation sequencing technology increases the demand for efficient solutions, in terms of space and time, for several bioinformatics problems. This paper presents a practical and easy-to-implement ...
FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues
(
Public Library of Science (PLoS)
, 2016 , Article)
A wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses are mediated by RNA-protein interactions. However, experimental determination ...
MLP Neural Network Based Gas Classification System on Zynq SoC
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ...
SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ...
A Reconfigurable Multipurpose SoC Mobile Platform for metal detection
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ...
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
Image Stitching System With Scanning Microscopy for Histopathological Applications
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
Using thermochromic ink for medical simulations
(
Hamad bin Khalifa University Press (HBKU Press)
, 2017 , Article)
Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...