Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Life Sciences

California Polytechnic State University, San Luis Obispo

Computer Science and Software Engineering

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Using Hadoop To Identify False Positives In Bacterial Strain Typing From Dna Fingerprints, Colin C. Adams Jun 2016

Using Hadoop To Identify False Positives In Bacterial Strain Typing From Dna Fingerprints, Colin C. Adams

Computer Science and Software Engineering

Pyroprinting is a novel technique used by the Department of Biological Sciences to obtain “fingerprints” from the DNA of E. coli isolates in order to categorize them into strains. To determine the number of false positives that occur in the pyroprinting process, isolates with the same pyroprints needed to be sequenced to see if their underlying alleles match. If they do match, this shows they are indeed the same strain and are a true positive. If the alleles don’t match, they are different strains and are a false positive. To do this 100 isolates with nucleotide identifiers were sequenced. Over …


Cal Poly Library Of Pyroprints: Quality Control Analysis And Web Development, Chase Ricketts Mar 2014

Cal Poly Library Of Pyroprints: Quality Control Analysis And Web Development, Chase Ricketts

Computer Science and Software Engineering

No abstract provided.


Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson Mar 2011

Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson

Computer Science and Software Engineering

The paper consists of a detailed examination of malware broken down into three main sections.

  1. Introduction: Malware in the World Today. Begins with a definition of terms, examination of the types of malware, research into historical pieces of malicious code, a detailed analysis of the attackers, why malware is so prevalent, and why it is so hard to defend against. This section finishes with a comparison of reasons to create and not to create malware.
  2. Background: "Good" Pieces of Malware. Examination of what makes malware effective. Analysis of the existing CVSS standard and proposal of the alternative VIPERS classification system. …