Background: The classification of protein sequences using string algorithms provides valuable insights for protein function prediction. Several methods, based on a variety of diff...
Extract-Transform-Load (ETL) activities are software modules responsible for populating a data warehouse with operational data, which have undergone a series of transformations on...
Abstract. Automatic personal identification based on palmprints has been considered as a promising technology in biometrics family during recent years. In pursuit of accurate palmp...
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...