3220 Slices
Medium 9781601322340

Classification of DNA Sequences by a MLP and SVM Network

Hamid R. Arabnia; Quoc-Nam Tran (Editors) Mercury Learning and Information PDF

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'13 |


Classification of DNA Sequences by a MLP and SVM Network



Institute of Computer Science,

Nygårdsgaten 112, Bergen University College,

N-5020, Bergen, Norway

E-mail: tkr@hib.no

Pattern solutions ltd.

Nygårdgaten 112

N-5020, Bergen, Norway

E-mail: fabien.guillaume@student.hib.no

Abstract - In this paper we show how a Multi-Layered

Perceptron (MLP) neural network and a Support Vector

Machine (SVM) are used to classify between eukaryotic and prokaryotic cells. The classification is based on their DNAsequences which are obtained from different databases available on Internet. The sequences are first pre-processed using a sliding window technique to obtain sub-sequence frequencies, and then normalised to make them comparable.

Keywords: MLP, SVM, prokaryotic and eukaryotic DNAsequences, Java, sliding window



One of the main research goals of molecular biology has been to determine a complete genetic description of any organism. In the Human Genome Project [4] the goal was to decipher the exact sequence of about 3 billion nucleotides in the 46 human chromosomes. An important part of the genome project is the computational processing of data [2].

See All Chapters
Medium 9781601323170

Session - Assessment Strategies + Evaluation, Analysis, Verification Methods + Systems

Hamid R. Arabnia Azita Bahrami, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF
Medium 9781601322593

Multi-disciplinary Approach to Cyber Security Education

Kevin Daimi; Hamid R. Arabnia; Michael R. Grimaila; Kathy Liszka; George Markowsky; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

Int'l Conf. Security and Management | SAM'13 |


Multi-disciplinary Approach to Cyber Security


Wendy A. Lawrence-Fowler

Department of Computer Science

The University of Texas-Pan American

1201 W. University Drive

Edinburg, Texas 78540 wfowler@utpa.edu

Abstract A multidisciplinary approach to cybersecurity education facilitates sound critical and analytic thinking and good communication. Students are introduced to a broader perspective and learn to think more openly and within alternative systems of thought. They are better prepared to recognize and assess assumptions, implications, and practical consequences.

Key words: cybersecurity education, computer security education; forensics education, multidisciplinary education in security, security



“We live in a world where a nation’s security depends in no small part on the security awareness and practices of our agencies, firms, suppliers, schools, friends, neighbors, relatives and, well, all of us.”[1] The increasing number of security breaches and threats to personal, organizational, and national safety have created a focus on cybersecurity. Today’s security workload is outstripping the capacity of the current security workforce to meet the demand [2]. Personnel across all sectors are sought to fill the cyber workforce need[3]. A challenge is to identify the sorts of people and formal education that are needed to assure there is a highly skilled and creative workforce that can respond to the dynamic challenges of cybersecurity today and into the future. In response to the U.S. government/s recognition that “securing cyberspace is an extraordinarily difficult challenge that requires a coordinated and focused effort from our entire society – the federal government, state and local governments, the private sector and the American people”[4], NIST introduced the National

See All Chapters
Medium 9789381159248

Chapter 8 The 8255 Programmable I/O Interface

M. Mahalakshmi Laxmi Publications PDF



The 8255 Programmable

I/O Interface



In this chapter, we are going to study programmable peripheral Interface (PPI) 8255 designed by Intel. It is a general purpose programmable I/O device used for parallel data transfer. It has

24 I/O pins which can be grouped in three 8 bit parallel ports. Port A, port B, and port C. The eight bits of port C can be used as individual bits or be grouped in two 4bit ports: Cupper (CU) and Clower (CL).

It can be programmed in two basic modes: Bit Set / Reset (BSR) mode and I/O mode. The

BSR mode is used to set or reset the bits in Port C

The I/O made is further divided into three modes.

Mode 0

: single I/O

Mode 1

: I/O with hand shake

Mode 2

: bi-directional point I/O data transfer

8.2 FEATURES OF 8255 A

The 8255A is a widely used, programmable parallel I/O device.

l It

can be programmed to transfer data under various conditions.

From single I/O to interrupt I/O.

l It

is compatible TTL compatible.

l It

l Its

l The

has three 8-bit ports: port A, port B and port C, which are arranged in two groups of

See All Chapters
Medium 9781683921998

Late Papers- Scientific Computing

Edited by Hamid R. Arabnia, Michael R. Grimaila, Douglas D. Hodson CSREA Press PDF

Int'l Conf. Scientific Computing | CSC'17 |






ISBN: 1-60132-452-9, CSREA Press ©


Int'l Conf. Scientific Computing | CSC'17 |

ISBN: 1-60132-452-9, CSREA Press ©

Int'l Conf. Scientific Computing | CSC'17 |


Mechanism to provide better Quality of Services (QoS) on 4G wireless network in Oman towards Smart City Mobility

A. Syed Imran Ali 1, B. Jitendra Pandey 1, C. Muhammad Sohail Hayat 1, D. Raza Hasan 1


Department of Computing, Middle East College, Muscat, Sultanate of Oman.

The development of wireless technology is growing up every day .If you see the previous wireless technology for mobile; you will be able to know how it going up .first generation had a feature of voice only where then other generation came and provide more services.

This research paper is about the impact and challenges of fourth generation in Oman .The research is an academic activity which means you will use different way for getting your information.

See All Chapters

See All Slices