Accelerating Information Retrieval from Profile Hidden Markov Model Databases
نویسندگان
چکیده
منابع مشابه
Accelerating Information Retrieval from Profile Hidden Markov Model Databases
Profile Hidden Markov Model (Profile-HMM) is an efficient statistical approach to represent protein families. Currently, several databases maintain valuable protein sequence information as profile-HMMs. There is an increasing interest to improve the efficiency of searching Profile-HMM databases to detect sequence-profile or profile-profile homology. However, most efforts to enhance searching ef...
متن کاملHidden Markov Model in Music Information Retrieval
The main idea behind HMM is that any observable sequence of events can be represented as a succession of states, with each state representing a grouped portion of the observation values and containing its features in a statistical form. The HMM keeps track of what state the sequence will start in, what state-to-state transitions are likely to take place, and what values are likely to occur in e...
متن کاملProfile-Profile Comparison Based on Hidden Markov Model Profiles
The detection of sequence similarity within the twilight zone has been a challenging problem in sequence analysis. Among various types of approaches for sequence similarity detection, the profileprofile comparison is one of the most reliable approaches [4]. In this study, we design a profile, named match-node profile, which is generated from match nodes in the Hidden Markov Model (HMM) profiles.
متن کاملProfile hidden Markov models
The recent literature on profile hidden Markov model (profile HMM) methods and software is reviewed. Profile HMMs turn a multiple sequence alignment into a position-specific scoring system suitable for searching databases for remotely homologous sequences. Profile HMM analyses complement standard pairwise comparison methods for large-scale sequence analysis. Several software implementations and...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PLOS ONE
سال: 2016
ISSN: 1932-6203
DOI: 10.1371/journal.pone.0166358