News Update on Hidden Markov Model Research: Dec – 2019

Profile hidden Markov models. The recent literature on profile hidden Andrei Markov model (profile HMM) strategies and software package is reviewed. Profile HMMs flip a multiple sequence alignment into a position-specific rating system appropriate for looking out databases for remotely homologous sequences. Profile HMM analyses complement normal pairwise comparison strategies for large-scale sequence analysis. many
Complete Reading

The aim of this book, which consists of four chapters, is to study two dimensional generalized thermoelastic problems for rotating functionally graded anisotropic plates (FGAPs). A dual-reciprocity boundary element method (DRBEM) is implemented for solving the problems. The accuracy of the proposed method was examined and confirmed by comparing the obtained results with those known
Complete Reading

Modeling Internet topology The topology of a network, or a gaggle of networks like the net, features a sturdy relating several management and performance problems. smart models of the topological structure of a network area unit essential for developing and analyzing internetworking technology. this text discusses however graph-based models will be wont to represent the
Complete Reading

Vertices of the graph G are labeled with first p-1 whole numbers, where p is the number of vertices of the graph and edges are labeled with absolute difference of the squares of the labels of the end vertices. If the greatest common divisor of the labels of all edges incident on a vertex of
Complete Reading

The formula of Fa`a Di Bruno provides a powerful tool to calculate the higher order derivative of a composite function. Unfortunately it has three weaknesses: it is not a recursive formula, it totally depends on the resolution of the diophantine equation and a change in the order of the derivative requires the total change of
Complete Reading

Square model is a software process model to develop Interactive Voice Response (IVR) software, used in call center industry. In this article, we measured the reliability of Square Model in the presence of covariate information. For this, we derived a failure intensity function which is used to measure the reliability of model using fix number
Complete Reading

In this chapter Bayes estimators of the reliability function R(t) under Type II censoring of Weibull distribution have been obtained by taking non-informative and beta prior distributions. The loss functions used are squared error, linex, precautionary and entropy. View Volume: http://bp.bookpi.org/index.php/bpi/catalog/book/97

The process of image segmentation is one of the most important steps in computer vision for image retrieval, visual summary, image-based modeling and in many other processes. The goal of segmentation is typically to locate certain objects of interest. In this paper, we have studied and investigated graph based normalized cut segmentation methods and proposed
Complete Reading

We present geometrical constructions using a straightedge and a compass in order to find the location of the axes, the vertices and the foci of a parabola, an ellipse and a hyperbola from their plots. The constructions are based on familiarity with theorems and special properties characterizing these loci, which therefore can be used for
Complete Reading

Human Computer Interaction Semantic filtering techniques are used in learning environment to track problems in collaborative systems. However, as noted in Adigun et al. [1], when sharing and dynamism are promoted, a problem of redundancy and integrity appeared not to have been well addressed. An improved ASF-based method of evaluating semantic filtering for social network
Complete Reading

Create Account



Log In Your Account



WP2Social Auto Publish Powered By : XYZScripts.com