Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Databases and Information Systems

Recta: Regulon Identification Based On Comparative Genomics And Transcriptomics Analysis, Xin Chen, Anjun Ma, Adam Mcdermaid, Hanyuan Zhang, Chao Liu, Huansheng Cao, Qin Ma May 2018

Recta: Regulon Identification Based On Comparative Genomics And Transcriptomics Analysis, Xin Chen, Anjun Ma, Adam Mcdermaid, Hanyuan Zhang, Chao Liu, Huansheng Cao, Qin Ma

School of Computing: Faculty Publications

Regulons, which serve as co-regulated gene groups contributing to the transcriptional regulation of microbial genomes, have the potential to aid in understanding of underlying regulatory mechanisms. In this study, we designed a novel computational pipeline, regulon identification based on comparative genomics and transcriptomics analysis (RECTA), for regulon prediction related to the gene regulatory network under certain conditions. To demonstrate the effectiveness of this tool, we implemented RECTA on Lactococcus lactis MG1363 data to elucidate acid-response regulons. A total of 51 regulons were identified, 14 of which have computational-verified significance. Among these 14 regulons, five of them were computationally predicted to …


Modular Scheduling System For Westside School District, Tyler Bienhoff Apr 2018

Modular Scheduling System For Westside School District, Tyler Bienhoff

Honors Theses

Westside School district offers a modular scheduling system for their high school that is more similar to a college schedule than the typical high school system. Due to the complexity of their master schedule each semester, there are no commercially available products that can assist in creating a schedule. Hence, this thesis discusses a scheduling algorithm and management system that was built specifically for Westside High School with the potential to be expanded for use by other interested schools. The first part of the paper is focused on gathering input from students and faculty for which courses and how many …


Surveying Digital Collections Stewardship In Nebraska [Original Survey Form], Jennifer L. Thoegersen, Blake Graham Apr 2018

Surveying Digital Collections Stewardship In Nebraska [Original Survey Form], Jennifer L. Thoegersen, Blake Graham

University of Nebraska-Lincoln Data Repository

No abstract provided.


The Emergence Of Institutional Repositories: A Conceptual Understanding Of Key Issues Through Review Of Literature, O. P. Saini Mar 2018

The Emergence Of Institutional Repositories: A Conceptual Understanding Of Key Issues Through Review Of Literature, O. P. Saini

Library Philosophy and Practice (e-journal)

It is the responsibility of the libraries to keep update its users by incorporating different technologies or tricks among the services offered to users. The libraries are managing diversified collection in both electronic and physical formats including the theses and dissertations awarded by their respective parent institutes in physical form. The academic libraries are directed by the Indian government through a mandate to protect and preserve the theses and dissertation in electronic form and provide access to the public domain. Institutional Repositories (IRs) have the perspective to store any amount of information electronically. Therefore, many of the academic libraries are …


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …