Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Protein Secondary Structure Prediction Using Parallelized Rule Induction From Coverings, Leong Lee, Cyriac Kandoth, Jennifer Leopold, Ronald L. Frank Dec 2009

Protein Secondary Structure Prediction Using Parallelized Rule Induction From Coverings, Leong Lee, Cyriac Kandoth, Jennifer Leopold, Ronald L. Frank

Computer Science Faculty Research & Creative Works

Protein 3D structure prediction has always been an important research area in bioinformatics. In particular, the prediction of secondary structure has been a well-studied research topic. Despite the recent breakthrough of combining multiple sequence alignment information and artificial intelligence algorithms to predict protein secondary structure, the Q3 accuracy of various computational prediction algorithms rarely has exceeded 75%. In a previous paper [1], this research team presented a rule-based method called RT-RICO (Relaxed Threshold Rule Induction from Coverings) to predict protein secondary structure. The average Q3 accuracy on the sample datasets using RT-RICO was 80.3%, an improvement over comparable computational methods. …


On Transport Protocol Performance Measurement Over 10gbps High Speed Optical Networks, Yixin Wu, Suman Kumar, Seung Jong Park Nov 2009

On Transport Protocol Performance Measurement Over 10gbps High Speed Optical Networks, Yixin Wu, Suman Kumar, Seung Jong Park

Computer Science Faculty Research & Creative Works

With the integration of IP and optical technology, fast optical network (of the order of 10Gbps) has emerged to support international research cooperation such as massive scientific data transfer and next generation Internet related research. Therefore, it is important to analyze the measurement issues to guide the high-speed transport protocol research for high-speed optical network of the order of 10Gbps. The objectives of this paper are as follows: i) determine the suitability of TCP parameters such as Jumbo Frame size, TCP sender and receiver buffer sizes; ii) evaluate TCP performance measurement tools and emulation tools over 10Gbps high speed optical …


T-Plausibility: Semantic Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si Aug 2009

T-Plausibility: Semantic Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si

Computer Science Faculty Research & Creative Works

Text documents play significant roles in decision making and scientific research. Under federal regulations, documents (e.g., pathology records) containing personally identifiable information cannot be shared freely, unless properly sanitized. Generally speaking, document sanitization consists of finding and hiding personally identifiable information. The first task has received much attention from the research community, but the main strategy for the second task has been to simply remove personal identifiers and very sensitive information (e.g., diseases and treatment). It is not hard to see that if important information (e.g., diagnoses and personal medical histories) is completely removed from pathology records, these records are …


Consistency Management Strategies For Data Replication In Mobile Ad Hoc Networks, Takahiro Hara, Sanjay Kumar Madria Jul 2009

Consistency Management Strategies For Data Replication In Mobile Ad Hoc Networks, Takahiro Hara, Sanjay Kumar Madria

Computer Science Faculty Research & Creative Works

In a mobile ad hoc network, data replication drastically improves data availability. However, since mobile hosts' mobility causes frequent network partitioning, consistency management of data operations on replicas becomes a crucial issue. In such an environment, the global consistency of data operations on replicas is not desirable by many applications. Thus, new consistency maintenance based on local conditions such as location and time need to be investigated. This paper attempts to classify different consistency levels according to requirements from applications and provides protocols to realize them. We report simulation results to investigate the characteristics of these consistency protocols in a …


Incentive Based Routing Protocol For Mobile Peer To Peer Networks, Anil Jade, Sanjay Kumar Madria, Mark Linderman May 2009

Incentive Based Routing Protocol For Mobile Peer To Peer Networks, Anil Jade, Sanjay Kumar Madria, Mark Linderman

Computer Science Faculty Research & Creative Works

Incentive models are becoming increasingly popular in Mobile Peer to Peer Networks (M-P2P) as these models entice node participation in return for a virtual currency to combat free riding and to effectively manage constraint resources in the network. Many routing protocols proposed are based on best effort data traffic policy, such as the shortest route selection (hop minimization). Using virtual currency to find a cost effective optimal route from the source to the destination, while considering Quality of Service (QoS) aspects such as bandwidth and service capacity constraints for data delivery, remains a challenging task due to the presence of …