Novel 3D protein structural homology search algorithm based on the Triangle ID
نویسندگان
چکیده
منابع مشابه
AN IMPROVED INTELLIGENT ALGORITHM BASED ON THE GROUP SEARCH ALGORITHM AND THE ARTIFICIAL FISH SWARM ALGORITHM
This article introduces two swarm intelligent algorithms, a group search optimizer (GSO) and an artificial fish swarm algorithm (AFSA). A single intelligent algorithm always has both merits in its specific formulation and deficiencies due to its inherent limitations. Therefore, we propose a mixture of these algorithms to create a new hybrid optimization algorithm known as the group search-artif...
متن کاملSTLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملFlexible protein-protein docking based on Best-First search algorithm
We developed a new high resolution protein-protein docking method based on Best-First search algorithm that loosely imitates protein-protein associations. The method operates in two stages: first, we perform a rigid search on the unbound proteins. Second, we search alternately on rigid and flexible degrees of freedom starting from multiple configurations from the rigid search. Both stages use h...
متن کاملOn the Mechanism of Homology Search by RecA Protein Filaments.
Genetic stability is a key factor in maintaining, survival, and reproduction of biological cells. It relies on many processes, but one of the most important is a homologous recombination, in which the repair of breaks in double-stranded DNA molecules is taking place with a help of several specific proteins. In bacteria, this task is accomplished by RecA proteins that are active as nucleoprotein...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Aided Chemistry
سال: 2005
ISSN: 1345-8647
DOI: 10.2751/jcac.6.44