Needleman-wunsch algorithm

Assignment Help Basic Computer Science
Reference no: EM131156701

Using Perl or Python programming languages, implement the Needleman-Wunsch algorithm to find the optimal global alignment between two sequences. The program should ask the user to input the two sequences first, then to choose from a list of scoring matrixes (BLOSUM62, PAM250, etc.), and finally set values for gap penalties. The program should output the final alignment and its total score.

Reference no: EM131156701

Questions Cloud

Create a distributed web crawler and indexer : Create a distributed web crawler and indexer.Your application should make use of a system that uses multiple crawler processes to traverse a set of websites and process or organize the data in a way that is easy to search.
Submit a deficiency slip for lab manualfor greens essentials : Submit a completed deficiency slip for Lab Manual for Green/Browies's Essentials of helth Information Management: Proncipales and Practices,3rd for Case06, Case07, Case08, Case09, and Case10 (Appendix of Lab Manual).
Create a distributed web crawler and indexer : Create a distributed web crawler and indexer. Your application should make use of a system that uses multiple crawler processes to traverse a set of websites and process or organize the data in a way that is easy to search.
Behavioral theory good at explaining current health behavior : In this position paper the authors debate the proper use of behavioral theory in health promotion interventions. In their paper they cite 2 dictionary definitions for the word, "theory." Which of the 2 is best suited to the position they are takin..
Needleman-wunsch algorithm : Using Perl or Python programming languages, implement the Needleman-Wunsch algorithm to find the optimal global alignment between two sequences. The program should ask the user to input the two sequences first
Independent student reading and research : The Global Security Policy Assignment Preparation: Activities include independent student reading and research. Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has o..
What is your process for assessing the risks : How will you manage the group? What is your process for assessing the risks? What techniques will you use
What is the temperature inside the cooker : An eight-liter pressure cooker contains a mixture of steam and liquid water at 2 bar. Through a level indicator we can see that the liquid occupies 25% of the volume inside the cooker.
Compare and contrast an nap and a mae : Compare and contrast an NAP and a MAE. Name a few examples of each please?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which operations can be implemented reasonably efficiently

Can the database system be made more efficient by using one or more additional BSTs to organize the records by location?

  Explain a machine shop has two automatic milling machines

A machine shop has two automatic milling machines. Machines' operation output data is in XML format. To improve the energy efficiency of the machines, operation data of power consumption and time stamps for each operation need to be extracted f..

  Document how the game works

Improve the program's functionality by utilizing at least 5 of the concepts from the list below. Document how the game works, including how you utilized each of the chosen concepts and what it's role is inthe overall program.

  Build a responsive mvc mobile first voting application

Build a responsive MVC mobile first voting application. Client should be able to vote for or against one issue

  Explaining kind of malicious software

What kind of malicious software is this? if username and password are valid return ALLOW_LOGIN else return DENY_LOGIN.

  Estimating the values of the fields

Suppose that an Ethernet packet is given and its hexadecimal dump is shown as below, where the Ethernet preamble and the Ethernet checksum trailer have been removed. Manually decode this Ethernet packet, and determine the values of the fields.

  Knowledge of at least one programming language

Insert subject outcomes, as in CSDB. Ensure that there is no variation on CSDB entry. Include only course learning outcomes that will be assessed The following table shows the alignment between the learning outcomes at the course and subject level..

  Both the userid and the person''s full name

a report and not just a listing:The report might be created with awk but it should have a heading. it should list both the userid and the person's full name (a person's fullname can be found in /etc/passwd file)

  Find the fraction of the conversion

Hint: use the logical operators to combine the 3 pins into one number, then divide that number by 8 (23) to find the fraction of the conversion and multiply that by 5V which would be the Arduino operating voltage.

  Determine the largest angle that will cause the wedge

If the horizontal force P is removed, determine the largest angle that will cause the wedge to be self-locking regardless of the magnitude of force F applied to the handle.

  What is the project scope and what is scope creep

What is the project scope? What is scope creep? Why does it pose such a risk to the project and project manager?

  Explain the function of input controls

Explain the function of input controls. Identify four (4) types of input control and explain the function of each. Provide an example of a data integrity error that could occur if each of these types of input control were not in place

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd