FF (Fragment Finder) is a web-based interactive search engine developed to retrieve the userdesired similar 3D structural fragments from the selected subset of 25 or 90% non-homologous protein chains. The search is based on the comparison of the main chain backbone conformational angles (f and w). Additionally, the queried motifs can be superimposed to find out how similar the structural fragments are, so that the information can be effectively used in molecular modeling. The engine has facilities to view the resultant superposed or individual 3D structure(s) on the client machine. The proposed web server is made freely accessible at the following
SSEP is a comprehensive resource for accessing information related to the secondary structural elements present in the 25 and 90% non-redundant protein chains. The database contains 1771 protein chains from 1670 protein structures and 6182 protein chains from 5425 protein structures in 25 and 90% non-redundant protein chains, respectively. The current version provides information about the alpha-helical segments and beta-strand fragments of varying lengths. In addition, it also contains the information about 3(10)-helix, beta- and nu-turns and hairpin loops. The free graphics program RASMOL has been interfaced with the search engine to visualize the three-dimensional structures of the user queried secondary structural fragment. The database is updated regularly and is available through Bioinformatics web server at http://cluster.physics.iisc.ernet.in/ssep/ or http://144.16.71.148/ssep/.
Transmembrane Helices in Genome Sequences (THGS) is an interactive web-based database, developed to search the transmembrane helices in the user-interested gene sequences available in the Genome Database (GDB). The proposed database has provision to search sequence motifs in transmembrane and globular proteins. In addition, the motif can be searched in the other sequence databases (Swiss-Prot and PIR) or in the macromolecular structure database, Protein Data Bank (PDB). Further, the 3D structure of the corresponding queried motif, if it is available in the solved protein structures deposited in the Protein Data Bank, can also be visualized using the widely used graphics package RASMOL. All the sequence databases used in the present work are updated frequently and hence the results produced are up to date. The database THGS is freely available via the world wide web and can be accessed at http:// pranag.physics.iisc.ernet.in/thgs/ or http://144.16. 71.10/thgs/.
SEM, Symmetry Equivalent Molecules, is a web-based graphical user interface to generate and visualize the symmetry equivalent molecules (proteins and nucleic acids). In addition, the program allows the users to save the three-dimensional atomic coordinates of the symmetry equivalent molecules in the local machine. The widely recognized graphics program RasMol has been deployed to visualize the reference (input atomic coordinates) and the symmetry equivalent molecules. This program is written using CGI/Perl scripts and has been interfaced with all the three-dimensional structures (solved using X-ray crystallography) available in the Protein Data Bank. The program, SEM, can be accessed over the World Wide Web interface at http://dicsoft2.physics.iisc.ernet.in/sem/ or http://144.16.71.11/sem/.
Security in information mining and Artificial Intelligence has been a critical zone of research amid the most recent couple of years. Today malicious attack is a security risk. These vindictive executables are made at the rate of thousands consistently and make genuine security issues. Intrusion Detection System (IDS) is utilized to access unapproved and vindictive attacks over the system. Information mining procedures that can be connected to IDS to distinguish ordinary and irregular personal conduct standards. An intrusion recognition framework investigates network exercises and distinguishes suspicious action in the system to improve exactness and security and recognize peculiarity attacks. IDS play a pivotal guideline in this period where systems achieved practically any part of action. Shockingly, IDS is a long way from perfection. Thusly, scientists dug constantly more profound to improve them. In this specific situation, information mining systems have been much abused for Intrusion location. In this paper, we present a relative investigation of data mining procedures for intrusion detection. In particular, we consider the general exhibitions of those strategies just as the effect of preparing information measure on their outcomes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.