登录
首页 » Visual C++ » problem-LastBossOrigin

problem-LastBossOrigin

于 2020-12-26 发布 文件大小:1112KB
0 164
下载积分: 1 下载次数: 29

代码说明:

  问题:找出一个短字符串在一个长字符串中的精确匹配。 要求:基于BWT压缩和FM索引技术的序列匹配,用Burrows-Wheeler transform算法解决该问题。(Problem: find the exact match of a short string in a long string. Requirements: BWT-based compression and indexing techniques sequence matching FM, with the Burrows-Wheeler transform algorithm to solve the problem)

文件列表:

problem-LastBossOrigin
......................\problem-LastBoss
......................\................\FinalProject.cpp,11477,2013-01-08
......................\................\main.dsp,3377,2013-01-08
......................\................\main.dsw,516,2013-01-08
......................\................\main.ncb,50176,2013-01-14
......................\................\main.opt,48640,2013-01-14
......................\................\main.plg,1162,2013-01-14
......................\................\out.txt,324,2013-01-08
......................\................\search_SRR00001.txt,202000,2013-01-04
......................\................\search_SRR163132.txt,202000,2013-01-04
......................\................\search_SRR311115.txt,202000,2013-01-04
......................\................\temp.txt,408,2013-01-08
......................\................\test.txt,895,2013-01-08
......................\................\后缀数组——处理字符串的有力工具.pdf,333469,2013-01-07
......................\................\基于BWT压缩和FM索引技术的序列匹配实验报告林川杰2010202594.docx,686788,2013-01-14
......................\................\大作业 2012-12-10.ppt,103424,2012-12-13

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • attackofwatermarking
    说明:  通过程序介绍的一些算法,可以对信息隐藏技术实施攻击,特别是水印技术.(procedures introduced by the algorithm, the information can be hidden to attack technology, in particular watermarking technology.)
    2006-04-18 11:58:33下载
    积分:1
  • leachvsdeec
    说明:  最近一直在看matlab仿真WSN的资料,今天找到一个仿真LEACH协议的。其主要是为了仿真他自己提出来的分簇协议,并给出了matlab代码,同时给出leach的代码。有兴趣的可以研究一下leach 协议和deec的协议对比(I've been looking at the MATLAB simulation WSN recently, and today I've found a simulation LEACH protocol. The main purpose is to simulate the clustering protocol proposed by himself, and give the matlab code, and give leach code at the same time. Interested can study the LEACH protocol and DEEC protocol comparison)
    2017-07-13 21:47:23下载
    积分:1
  • wenlitezhengtiqufangfa
    关于在图形图像处理过程中纹理特征提取方法的介绍(About in the process of image processing texture feature extraction method is introduced)
    2015-04-27 13:25:06下载
    积分:1
  • BitmapTest
    很好的解析bmp图片的源代码,很不错的初学者的例子,换页大家下载(Very good analytical bmp image of the source code, it is a good example for beginners, for everyone to download page)
    2007-11-29 21:23:35下载
    积分:1
  • VC使用进度条空间
    一个简单的例子,演示如果通过VC使用进度条空间(A simple example demonstrates how to use progress bar space through VC)
    2020-06-22 08:40:01下载
    积分:1
  • 71477187dwt_embed
    非压缩视频图像帧内水印的密写与复密写研究,源码和论文材料(Video Watermarking Steganography)
    2010-05-18 20:12:23下载
    积分:1
  • lzwGif
    gif格式图片生成,包括动画生成,是非常好的入门学习资料。(gif format image generation, including animation generation, is a very good learning materials.)
    2013-12-09 20:43:10下载
    积分:1
  • InterSection
    检测空间中直线是否相交(动态)(detect whether linear space intersect (dynamic))
    2004-12-02 12:16:17下载
    积分:1
  • cecaijance
    颜色预测模型评估,印刷品质量检测技术,实现光谱分析,检测色彩偏差(color model assessment, print quality inspection technology, spectrum analysis, color deviation detection)
    2007-05-29 11:57:25下载
    积分:1
  • shuxuexingtaiquzao
    数学形态学去噪 有效地还原了原始信号 去除了振动噪声和基线漂移(signal denoising )
    2016-04-07 09:56:54下载
    积分:1
  • 696518资源总数
  • 104349会员总数
  • 32今日下载