Describe in detail how the blast algorithm works

Assignment Help Data Structure & Algorithms
Reference no: EM13746975

1. Given the following sequence from Saccharomyces cerevisease: GATCTCACGATATAT

a. What is the most likely translation frame?

b. What is this sequence? How can you tell?

2. Given the following DNA sequence: GGTGTAAAGAATCTT

a. Construct a keyword tree

b. Construct a suffix tree

3. Given the following distance matrix, construct a neighbor-joining distance tree. Show all your work! (20 points).

 

1

2

3

4

1

0

 

 

 

2

21

0

 

 

3

5

25

0

 

4

15

30

23

0

4. Describe in detail how the BLAST algorithm works.

5. What are the criteria for confidence for the strength of a BLAST hit?

6. What is the measure of confidence used for phylogenetic tree construction? (5 points)

7. What is meant by "wobble" in reference to the genetic code?

8. How many different nucleotide sequences can code for the following protein sequence: (15 points): Arg-Lys-Pro-Val-Ser-Ile-Ala

Reference no: EM13746975

Questions Cloud

Write a three page essay on triangle fire : Write a three page essay on Triangle Fire using a Brief History with Documents. Develop a main point based on the information and insights you gained from the book.
Partnerships capital balances : Gibbs, Cook, and Chan are partners and share income and loss in a 5:1:4 ratios. The partnership's capital balances are as follows: Gibbs, $606,000; Cook, $148,000; and Chan, $446,000. Gibbs decides to withdraw from the partnership, and the partners a..
Define multivate technique is factor analysis : how it is different from the other 2 techniques, how at least 1 other real-life company has used this technique to address a business problem, and how that technique might be used at your own organization. The Choosen Multivate Technique is Factor..
Record the following transactions for current fiscal year : A corporation was organized on January 30 of the current year, with an authorization of 20,000 shares of $4 preferred stock, $12 par, and 100,000 shares of $3 par common stock. On the first day of the current fiscal year, $1,500,000 of 10-year, 8% bo..
Describe in detail how the blast algorithm works : Describe in detail how the BLAST algorithm works and What are the criteria for confidence for the strength of a BLAST hit
Describe multidimensional scaling and cluster analysis : Research the library, and provide at least 1 example of how a real company has used each of the following multivariate techniques: factor analysis, multidimensional scaling, and cluster analysis.
If bonds are issued at a discount : If bonds are issued at a discount, it means that the
Determine the liability for gift certificates : Determine the liability for gift certificates to be reported in the December 31, 2013 balance sheet. What is the appropriate classification (current or noncurrent) of the liabilities at December 31, 2013?
Do you agree with the inquisitors interrogation of veronese : Do you agree with the Inquisitor's interrogation of Veronese about his painting, originally titled Last Supper? Or, do you side with Veronese? Explain your response.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  The development of complex algorithms that can mine mounds

the development of complex algorithms that can mine mounds of data that have been collected from people and digital

  Design an o(v+e) time algorithm that computes

Design an O(V+E) time algorithm that computes the smallest number of batches required to complete all tasks. A task can be assigned to a batch i if and only if all tasks that are its prerequisites have already been assigned to batches 1 to (i-1).

  Create an er diagram

Create an E-R diagram with all appropriate notation for the following condition. In a particular fruit growing region there are a number of orchards.

  What sequence of characters would you push onto a stack

Hardware vendor XYZ Corp. claims that their latest computer will run 256 times faster than that of their competitor, Prunes, Inc.

  Question about character array

The 2-most important design issues that are specific to character string types are the given, Should strings be simply a special kind of character array or a primitive type?

  Creating two single dimension arrays

Make two single dimension arrays that contain ten floating point numbers in each array. Make a third single dimension array to hold a sum.

  Unctions for doing sort, search, display, replace, delete

create functions for doing sort, search, display, replace, delete, and add. You can use dynamic memory allocation for enlarge the size of pointer array for adding a new country.

  Describe an algorithm to play the game of nim using all of

describe an algorithm to play the game of nim using all of the three tools discussed in class pseudocode flowchart

  Write algorithm to create job applicant report

Write the algorithm to create job applicant report. Input consists of a series of records that contain the Social Security number or equivalent, last name, first name, middle initial.

  Effective address-addressing mode of instruction is direct

Evaluate the effective address if the addressing mode of the instruction is (a) direct; (b) immediate; (c) relative; (d) register indirect.

  Question about key encryption

Assume Alice wishes to send an e-mail to Bob. Bob has a public private key pair, Alice has Bob's certificate. But Alice does not have a public, private key pair.

  The class linked bag did not have the data member itemcount

the class LinkedBag did not have the data member itemCount. Revise the method getCurrentSize so that it counts the number of nodes in the linked chain

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd