Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Using suffix trees, give an algorithm to find a longest common substring shared among three input strings: s1 of length n1, s2 of length n2 and s3 of length n3.

2. A non-empty string α is called a minimal unique substring of s if and only if it satisfies:

(i) α occurs exactly once in s (uniqueness),

(ii) all proper prefixes of α occur at least twice in s (mimimality), and

(iii) α >= l for some constant l.Give an optimal algorithm to enumerate all minimal unique substrings of s.

3. Redundant sequence identification: Given a set of k DNA sequences, S = {s1, s2........sk }, give an optimal algorithm to identify all sequences that are completely contained in (i.e., substrings of) at least one other sequence in S.

4. Let S = {s1, s2,......,sk} denote a set of k genomes. The problem of  fingerprinting is the task of identifying a shortest possible substring αi from each string si such  that αi is unique to si  i.e., no other genome in the set S has αi. Such an αi will be called a fingerprint of si. (Note that it is OK for αi to be present more than once within si.) Give an algorithm to enumerate a fingerprint for each input genome, if one exists. Assume that no two input genomes are identical.

5. A string s is said to be periodic with a period α , if s is αk for some k>=2. (Note that αk is the string formed by concatenating α k times.) A DNA sequence s is called a tandem repeat if it is periodic. Given a DNA sequence s, determine if it is periodic, and if so, the values for α and k. Note that there could be more than one period for a periodic string. In such a case, you need to report the shortest period.

6. A non-empty string β is called a repeat prefix of a string s if ββ is a prefix of s. Give a linear time algorithm to find the longest repeat prefix of s.

7. Given strings s1 and s2 of lengths m and n respectively, a minimum cover of s1 by s2 is a decomposition s1 = w1w2......wk, where each wi is a non-empty substring of s2 and k is minimized. Eg., given s1 = accgtatct and s2 = cgtactcatc, there are several covers of s1 by s2 possible, two of which are: (i) cover1: s1 = w1w2w3w4 (where w1 = ac, w2 = cgt, w3 = atc, w4 = t) , and (ii) cover2: s1 = w1w2w3w4w5 (where w1 = ac, w2 = c, w3 = gt, w4 = atc, w5 = t). However, only cover1 is a minimal cover. Give an algorithm to compute a minimum cover (if one exists) in O(m + n) time and space. If a minimum cover does not exist your algorithm should state so and terminate within the same time and space bounds. Give a brief justification of why you think your algorithm is correct | meaning, how it guarantees finding the minimial cover (if one exists).

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91531

Have any Question? 


Related Questions in Computer Engineering

Disscussion questionsneed a paragraphs on each

Disscussion Questions Need a Paragraphs on each question Choosing a Power Supply Choosing a Motherboard Name the 9 major parts of the motherboard and describe it purpose Your group has been asked to present to a high sch ...

The web server on the dmz web server system renames

The Web server on the DMZ Web server system renames temporary files used to record transactions. The name has the form trns followed by the integer representation of the date and time, followed by one or more digits. Why ...

1 why are vulnerabilities difficult to predict2 discuss the

1. Why are vulnerabilities difficult to predict? 2. Discuss the sources of system vulnerabilities. 3. Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those ...

Given the following sequence of keys 80 7 24 16 43 91 35 2

Given the following sequence of keys (80, 7, 24, 16, 43, 91, 35, 2, 19, 72), trace the indicated algorithm to produce a recursive call tree when sorting the values in descending order. (a) merge sort (b) quick sort

1 are idss similar to fi rewalls2 why are system intrusions

1. Are IDSs similar to fi rewalls? 2. Why are system intrusions dangerous? 3. Discuss the best approaches to implementing an effective IDS. 4. Can system intrusions be stopped? Support your response.

Design a security service that provides data integrity data

Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integ ...

Assume a tcp server is expecting to receive byte 2401 it

Assume a TCP server is expecting to receive byte 2401. It receives asegment with the sequence number 2401 that carries 500 bytes. If the server has no data to send at this moment and has not acknowledged the previous seg ...

1 list and describe the five vulnerability assessment

1. List and describe the five vulnerability assessment processes described in the text. Can you think of some other assessment processes that might exist? 2. What is digital forensics, and when is it used in a business s ...

Assume alice the client creates a tcp connection with bob

Assume Alice, the client, creates a TCP connection with Bob, the server. They exchange data and close the connection. Now Alice starts a new connection with Bob by sending a new SYN segment. The server responds with the ...

1 research and develop a comprehensive list of the current

1. Research and develop a comprehensive list of the current known viruses. 2. Research, find, and study a virus code. Write an antivirus for that code. 3. Look at a popular application such as PowerPoint or Excel. Find a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen