Compute the suffix array for the same string

Assignment Help Computer Engineering
Reference no: EM132118927

You have to read the questions from A-G but I have completed A-C already. I have A-C complete. I just need D-G completed. Thank you.

Problem 4 (30 points): Suffix tree, suffix array and BWT

A). Show the suffix tree for string actgctcggct.

B). Compute the suffix array for the same string.

C). Compute the BWT transformation for the same string.

D). Assume that an implementation of suffix tree for DNA sequences uses 20 bytes per base. Estimate the memory requirement for a suffix tree representation of the human genome, which has 3 billion bases.

E). Estimate the memory requirement for a suffix array representation of the human genome.

F). Estimate the memory requirement for a BWT representation of the human genome.

G). Considering that we are indexing a large database of strings with 3 billions "characters", where each "character" is an integer in the range of 1 to 216. Does this change the memory requirement of suffix array and BWT? What impact it might have on suffix trees?

Reference no: EM132118927

Questions Cloud

Risk-averse-risk-neutral and risk-seeking : Provide examples of real organizations that represent each level of risk tolerance: risk-averse, risk-neutral and risk-see
Design a set of database tables to store information : Design a set of database tables to store information about classes and instructors for the classes.
Future value and compound interest formula : Find the future value and compound interest. Use the? $1.00 future value table or the future value and compound interest formula.
Learning facilitation methods : What are the advantages of action learning sets when compared with other learning facilitation methods?
Compute the suffix array for the same string : Does this change the memory requirement of suffix array and BWT? What impact it might have on suffix trees?
Feedback on the performance of team members : How does collecting regular feedback on the performance of team members, from relevant sources assist managers in identifying the learning needs of individuals
Write a use case buy a new car : Consider a system for buying a new car. The customer should inspect the vehicle and chose the type, the color and the desired characteristic.
When a leader use the concept of putting others : When a Leader use the concept of putting others before oneself how does it affect a company's culture in regards to its organizational effectiveness?
Determining the highest present value : Which of the following prizes has the highest present value? Assume May is 40 years old and expect to live until 85.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Compare the performance using amat of a one-level split

compare the performance using amat of a one-level split cache and a two-level unified cache system. for the one-level

  Write an appliction that asks a user type 1, 2, 3 or 4

Write down an appliction that asks a user type 1, 2, 3 or 4. When the user types 4, the program ends. When the user types 1, 2, or 3, the program displays the message "Good job!" and then asks for another input.

  Conducting the forensic investigation

Describe the purpose of several initial reviews being conducted by forensics investigator (e.g., time lines, technical skills, procedures).

  Construct a 3-bit counter

Construct a 3-bit counter using three D flip-flops and a selection of logic gates. The inputs should consist of a signal that resets the counter to 0, called reset, and a signal to increment the counter, called inc.

  The aim of this project is to exercise and test your

the aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to

  Define a point made by a classmate

What rights to privacy do people have while using the Internet at home? Are their privacy rights limited? Do those same rights and limits exist at work? Explain your answer.

  Define second criterion for a cryptographic hash function

Define the first criterion for a cryptographic hash function. Define the second criterion for a cryptographic hash function.

  Examine the concept of privacy and its legal protections

Examine the concept of privacy and its legal protections, Identify risk analysis and incident response procedures

  Discuss the effectiveness of these security features

Secure Web sites often include 'enhanced security questions' or 'security images' in an attempt to assure that only authorized users could access the sites. Research and discuss effectiveness of these security features.

  Design a circular node list adt that abstracts a circularly

Design a circular node list ADT that abstracts a circularly linked list in the -same way that the node list ADT abstracts a doubly linked list.

  Compare the two specifications from several points of view

Describe, in both an operational style and a descriptive style, the following problem. Compare the two specifications from several points of view.

  Compare the execution times of the two versions of program

Write a C program to compute binom(n,m) recursively. The values for n and m should be passed as command-line arguments with appropriate error checking.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd