Carrying out Phylogenetic Analyses through Computational Model Checking

نویسنده

  • Ying Xu
چکیده

classify specified organisms taxonomically, determine the origins of proteinencoding genes, and infer how proteins function based on their conserved sequence motifs. Typically, phylogenic analysis involves two steps: constructing a phylogenetic tree or network based on the given biosequences and deriving biological information from the tree or network. Many computational methods have been developed to construct phylogenetic trees, but in most published studies the biological information from the phylogenetic trees is derived manually. In “Temporal Logics for Phylogenetic Analysis via Model Checking”

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model Checking Reconfigurable Processor Configurations for Safety Properties

Reconfigurable processors pose unique problems for program safety because of their use of computational approaches that are difficult to integrate into traditional program analyses. The combination of proof-carrying code for verification of standard processor machine code and model-checking for array configurations is explored. This combination extends proof-carrying code to provide a context f...

متن کامل

A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness

Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a graphical formal modeling language to specify and model the system. However, modeling of large s...

متن کامل

Verify Properties of Mobile Code

Given a program and a speci cation, you may want to verify mechanically and e ciently that this program satis es the speci cation. Software veri cation techniques typically involve theorem proving. If a formal speci cation is easily available, consumption of computational resources is a major issue. Meanwhile, we shall not overlook the psychological factors. Often, you need extra expertise to v...

متن کامل

Polymer-Optical-Fiber Lasers and Amplifiers Doped with Organic Dyes

Polymer optical fibers (POFs) doped with organic dyes can be used to make efficient lasers and amplifiers due to the high gains achievable in short distances. This paper analyzes the peculiarities of light amplification in POFs through some experimental data and a computational model capable of carrying out both power and spectral analyses. We investigate the emission spectral shifts and widths...

متن کامل

Implementation of a Lean Model for Carrying out Value Stream Mapping in a Manufacturing Industry

Value Stream Mapping technique involves flowcharting the steps, activities, material flows, communications, and other process elements that are involved with a process or transformation. In this respect, Value stream mapping helps an organization to identify the non-value-adding elements in a targeted process and brings a product or a group of products that use the same resources through the ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Computer

دوره 48  شماره 

صفحات  -

تاریخ انتشار 2015