Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2023
Establishment and Application of Loop-Mediated Isothermal Amplification for Tea-Cigarette Identification
- Ke Zhang,
- Zhijun Tong,
- Kai Liu,
- Chunqiong Wang,
- Haiyan Li,
- Di Xiao,
- Xiaowei Zhang,
- Haowei Sun,
- Jie Long,
- Jieyun Cai,
- Jialei Xing,
- Jinchu Yang
ICBBT '23: Proceedings of the 2023 15th International Conference on Bioinformatics and Biomedical TechnologyPages 96–103https://doi.org/10.1145/3608164.3608178To provide a rapid and simple test method for tea-cigarette identification, a loop-mediated isothermal amplification (LAMP) primers were designed for the conserved region of the selected Nicotiana-specific gene Ntsp151 sequence, and a visual LAMP ...
- research-articleAugust 2023
Whole Genomic Sequencing and Bioinformatic Analysis of Arthrospira Platensis SBC
ICBBB '23: Proceedings of the 2023 13th International Conference on Bioscience, Biochemistry and BioinformaticsPages 34–39https://doi.org/10.1145/3586139.3586144Due to the exhausted usage of non-renewable petroleum-derived fuels, an increasing global demand for a biologically produced energy source has emerged. Microalgae biomass has become one of the most promising alternatives. Arthrospira platensis is one of ...
- research-articleJanuary 2021
High-performance genome sorting program
Procedia Computer Science (PROCS), Volume 193, Issue CPages 464–473https://doi.org/10.1016/j.procs.2021.10.048AbstractThis paper is devoted to the practical application of parallel sorting algorithms and parallel input-output methods for the problem of genome alignment. The paper considers different approaches to the implementation of such algorithms, taking into ...
- research-articleMarch 2020
PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 329–340https://doi.org/10.1145/3374664.3375729Genome sequencing has rapidly advanced in the last decade, making it easier for anyone to obtain digital genomes at low costs from companies such as Helix, MyHeritage, and 23andMe. Companies now offer their services in a direct-to-consumer (DTC) model ...
- research-articleJuly 2019
Evolutionary search techniques for the Lyndon factorization of biosequences
GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference CompanionPages 1543–1550https://doi.org/10.1145/3319619.3326872A non-empty string x over an ordered alphabet is said to be a Lyndon word if it is alphabetically smaller than all of its cyclic rotations. Any string can be uniquely factored into Lyndon words and efficient algorithms exist to perform the factorization ...
-
- research-articleApril 2017
Privacy-preserving and Optimal Interval Release for Disease Susceptibility
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityPages 532–545https://doi.org/10.1145/3052973.3053021In this paper, we consider the problem of privacy-preserving release of function outputs that take private information as input. Disease susceptibilities are known to be associated with clinical features (e.g., age, sex) as well as genetic features ...
- articleMarch 2015
GPUDePiCt: a parallel implementation of a clustering algorithm for computing degenerate primers on graphics processing units
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 12, Issue 2Pages 445–454https://doi.org/10.1109/TCBB.2014.2355231In order to make multiple copies of a target sequence in the laboratory, the technique of Polymerase Chain Reaction (PCR) requires the design of "primers", which are short fragments of nucleotides complementary to the flanking regions of the target ...
- research-articleNovember 2014
Oblivious Evaluation of Non-deterministic Finite Automata with Application to Privacy-Preserving Virus Genome Detection
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 21–30https://doi.org/10.1145/2665943.2665954Various string matching problems can be solved by means of a deterministic finite automaton (DFA) or a non-deterministic finite automaton (NFA). In non-oblivious cases, DFAs are often preferred for their run-time efficiency despite larger sizes. In ...
- articleSeptember 2014
Enabling large-scale next-generation sequence assembly with Blacklight
- M. Brian Couger,
- Lenore Pipes,
- Fabio Squina,
- Rolf Prade,
- Adam Siepel,
- Robert Palermo,
- Michael G. Katze,
- Christopher E. Mason,
- Philip D. Blood
A variety of extremely challenging biological sequence analyses were conducted on the XSEDE large shared memory resource Blacklight, using current bioinformatics tools and encompassing a wide range of scientific applications. These include genomic ...
- ArticleNovember 2013
A Dynamic Programming Algorithm for Unsigned (1,2)-Exemplar Breakpoint Distance Problem with Span Constraint
BIFE '13: Proceedings of the 2013 Sixth International Conference on Business Intelligence and Financial EngineeringPages 39–43https://doi.org/10.1109/BIFE.2013.10The exemplar breakpoint distance problem (EBD for short) is NP-hard, even when one of the genomes, called G_1, has no repetition, and the other genome, called G_2, has genes that appear at most twice in the genome ((1, 2)-Exemplar Breakpoint Distance ...
- ArticleNovember 2013
A Pipeline to Characterize Virulence Factors in Mycobacterium Massiliense Genome
- Guilherme Menegói,
- Tainá Raiol,
- João Victor Araújo Oliveira,
- Edans Flávius Oliveira Sandes,
- Alba Cristina Melo,
- Andréa Queiroz Maranhão,
- Ildinete Silva-Pereira,
- Anamélia Lorenzetti Bocca,
- Ana Paula Junqueira-Kipnis,
- Maria Emília Walter,
- André Kipnis,
- Marcelo Macedo Brígido
BSB 2013: 8th Brazilian Symposium on Advances in Bioinformatics and Computational Biology - Volume 8213Pages 202–213https://doi.org/10.1007/978-3-319-02624-4_19Virulence factors represent crucial molecular features for understanding pathogenic mechanisms. Here we describe a pipeline for in silico prediction of virulence factor genes in Mycobacterium massiliense genome that could be easily used in many other ...
- articleNovember 2013
An Exact Algorithm for the Zero Exemplar Breakpoint Distance Problem
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 10, Issue 6Pages 1469–1477https://doi.org/10.1109/TCBB.2013.127The exemplar breakpoint distance problem is one of the most important problems in genome comparison and has been extensively studied in the literature. The exemplar breakpoint distance problem cannot be approximated within any factor even if each gene ...
- research-articleJuly 2013
Enabling large-scale next-generation sequence assembly with Blacklight
XSEDE '13: Proceedings of the Conference on Extreme Science and Engineering Discovery Environment: Gateway to DiscoveryArticle No.: 27, Pages 1–6https://doi.org/10.1145/2484762.2484832A variety of extremely challenging biological sequence analyses were conducted on the XSEDE large shared memory resource Blacklight, using current bioinformatics tools and encompassing a wide range of scientific applications. These include genomic ...
- ArticleOctober 2012
Improvement Based on Data Version Management in TM
ISCID '12: Proceedings of the 2012 Fifth International Symposium on Computational Intelligence and Design - Volume 01Pages 310–313https://doi.org/10.1109/ISCID.2012.85In order to promote parallel computing in multi-cores, transactional memory is studied. Several transactional memory systems are introduced in this paper. to compare the performance of STM library implementations with different types of write ...
- ArticleOctober 2012
A transformation-based model of malware derivation
MALWARE '12: Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software (MALWARE)Pages 17–25https://doi.org/10.1109/MALWARE.2012.6461003Since most malware is derived from prior code, understanding malware derivation and evolution is essential for many types of malware analysis. However prior models of malware relationships are insufficiently precise or fail to capture important ...
- research-articleAugust 2011
Immunoinformatic discovery of potential cross-reactive T cell epitopes in the measles genome
BCB '11: Proceedings of the 2nd ACM Conference on Bioinformatics, Computational Biology and BiomedicinePages 589–593https://doi.org/10.1145/2147805.2147906T cells are key mediators of inflammatory processes that can be activated by pathogens and vaccines. Some vaccine antigens may encode T cell epitopes that can cross-react with either human or human microbiome epitopes, causing deviation of the T cell ...
- ArticleJuly 2011
Information extraction from semi-structured resources: a two-phase finite state transducers approach
CIAA'11: Proceedings of the 16th international conference on Implementation and application of automataPages 282–289The paper presents a new method for extracting information from semi-structured resources, based on finite state transducers. The method has two clearly distinguished phases. The first phase - pre-processing phase - strongly relies upon the analysis of ...
- articleDecember 2010
Evaluation of BIC and Cross Validation for model selection on sequence segmentations
International Journal of Data Mining and Bioinformatics (IJDMB), Volume 4, Issue 6Pages 675–700https://doi.org/10.1504/IJDMB.2010.037547Segmentation is a general data mining technique for summarising and analysing sequential data. Segmentation can be applied, e.g., when studying large-scale genomic structures such as isochores. Choosing the number of segments remains a challenging ...
- articleSeptember 2010
Genome size, self-organization and DNA's dark matter
Complexity (COMJ), Volume 16, Issue 1Pages 20–23Chromosomes exhibit several features indicating that its spatiotemporal dynamics is self-organized. It has been recently suggested that a negative correlation between genome size and mean chromosome number would also be a fingerprint of selforganization,...