Tuesday, May 6, 2014

Fundamentals of Bioinformatics Lecturer: Vesselin Baev e-mail: baev@uni-plovdiv.bg Index of the cou

Faculty of Biology Bioinformatics
Index of subjects: I Semester: Introduction to Informatics if it fits it ships Computer Networks Fundamentals of Bioinformatics bioinformatics if it fits it ships analysis Semester II: Working if it fits it ships with databases genomics and molecular evolution Mapping and sequencing of the genome WEB Design and Programming II I semester: Fundamentals of Statistics Programming Perl Programming in Bioinformatics Proteomics
Fundamentals of Bioinformatics Lecturer: Vesselin Baev e-mail: baev@uni-plovdiv.bg Index of the course: Prerequisites Technical Summary certain supplies thematic content of the training Course Literature
Course in Bioinformatics's main objective is to familiarize students with the basics of applied science combining computer science with modern biology. As a basic introductory course, he e based on the clarification of methods and models that informatics contributes to the development of molecular biology. if it fits it ships
The course begins with lectures which deal with basic tools and methods of Bioinformatics. DNA, protein sequences and structures, genomes and proteome databases and data mining, if it fits it ships WWW and computer programming.
The third part of the course if it fits it ships introduces students to the basic knowledge of Internet use in bioinformatics. The main archives database, and how to extract information from them.
Next topic classes are analyzes of the relationship between sequence-alaynmant and phylogenetic trees. These methods are essential for solving one of the main tasks of bioinformatics: the search for distant relationships between the genomes of different organisms and tracing the course of evolution of the species level and the molecular level.
Students should know and / or be able to:-have basic knowledge of computer architecture, computer networks, to know the basic principles of molecular biology and molecular evolution to be able to absorb the material foundations of bioinformatics
-Speed if it fits it ships Internet, a computer lab, bioinformatics workstations (servers) bioinformatics if it fits it ships software-local bio-electronic databases (CC) and a paper copy of the lectures, web-portal of the academic unit with all the necessary materials for self-study and preparation.
4. PDB; Dedicated DB Arabidopsis, org, WormBase, TIGR. Specialized if it fits it ships database FlyBase, Rfam, miRNA registry data and dr.Bazi proteins ProDom, InterPro, if it fits it ships Pfam, ProSyte and dr.Tarsene and retrieve data from the database, creating a local database.
5. Comparison of nucleotide if it fits it ships and protein sequences - and important application if it fits it ships of the method. Types of negative and positive results on bioinformatics analysis, sensitivity and selectivity of the programs.
8. Bioinformatics RNA types pairings in RNA types RNAs, antisense RNK.Niva structure of RNA. A secondary structure of RNA - elements of the structure. Display 2D structures. Prediction of the secondary structure of RNA. Calculating the energy of 2D RNA structure. Types of structural simulation of RNA. Mfold.
References 1. Introduction to Bioinformatics, Oxford University Press 2. Bioinfromatics - sequence and genome analysis, if it fits it ships Cold Spring Harbor Laboratory Press 3. Bioinformatics: A practical guide to the analysis of genes and proteins, John Wiley & Sons . Computer Networks
Index of the course: Prerequisites Summary Technical Competencies certain supplies thematic content of the training Course Literature Speaker: Viktor Ivanov e-mail: viktor@uni-plovdiv.bg
Bioinformatics, as an interdisciplinary science is served by many service science. Bioinformatics work demands a knowledge of computer if it fits it ships networks and the Internet to achieve the goals and objectives if it fits it ships set by biology. The internet is a valuable and irreplaceable resource for information transmission medium for communication and processing of bioinformatics data. Therefore, bioinformatics curriculum if it fits it ships requires study of computer networks, their detailed understanding and administration.
Computer-structure and principle of operation, Introduction to computers Web-based computer networks, network devices, network transmission media, types of network architecture (topology) if it fits it ships Network protocols-Internet-Fundamentals of Ethernet technology
After completing the course, students will be ready to decide nd

Monday, May 5, 2014

3. Electronic pasha bulker clock What we give to the world is the question. This is the third answe

What we Bulgarians have given the world? | Www.EuroChicago.com - The Bulgarian Media Portal in Chicago
Approaching national holiday of Bulgaria March 3. At the request of our readers we publish an already written and circulated around the internet article, but important clarification for her authorship What we give to the world? pasha bulker
Before any other month and an Englishman asked me: What do you Bulgarians have given the world? Irritated by the question, I took to defend their homeland. But alas I did not get very far. It turned out that I do not know that's that much. It motivates me. I dug around the internet and books. Gathered not one or two significant achievements. All in one - a case of Bulgaria. Day after day I will publish Bulgarian achievements and discoveries. pasha bulker I named the series "What we have given to the world?"
I believe that this must be firmly anchored in the curriculum. But as for some of us too late to get back on the bench. pasha bulker Let's learn from the Bulgarian case and remember it. And ask us tomorrow - Meeting: proud to be Bulgarians.
One. We Yogurt What if the world is the question. And this is the first answer. The packaging of each lactic acid produced in Japan, displays the name of the discoverer of lactic acid bacteria:
Dr. Grigorov was born in the village of cold spring, Tran, 1878 In 1905, for the first time describes the lactic organism that causes fermentation necessary for Bulgarian yogurt. Later microorganism is called: lactobacillus bulgaricus, in honor of the homeland of his discoverer. pasha bulker Today the official name of this microorganism is: lactobacillus delbureckii subsp. bulgaricus Grigoroff 1905.
There are a bunch of theories about the origin of yogurt. Turks say it is theirs. Greeks straight to advertise it as theirs. Iranians and whatnot fight for this glory. Thracians, however, are the first to eat yogurt. To me this is visible enough and the dispute is unnecessary. Just remember that the Bulgarian has found lactic acid bacteria. Something interesting: Bulgarian yoghurt and the inscription Lactobacillus bulgaricus are patented in Bulgaria. Bulgarian yoghurt is produced by two ingredients: milk and yeast. Products containing pasha bulker another example milk, soy, starch, preservatives to stop fermentation, not Bulgarian yoghurt.
2. Computer what we give to the world is the question. And this is the second answer. To be absolutely accurate to say the first automatic computing machine that marks the beginning of the computer era, was invented in 1939 by:
And, to be even more perfect: in September 1939 John Atanasov with Clifford Berry began working on the project of computer Atanasoff - Berry (ABC) and in November 1939 they demonstrated a prototype. What we know about John Atanasov? He was born on October 4, 1903 in Hamilton, New York. Parents - Iva and Ivan Atanasov. He has won a bunch of awards. He worked in the U.S. Marine Corps. He was a director of various corporations. Something interesting: Asteroid near Mars, named after John Atanasov. It was discovered and studied by Bulgarians in the National Astronomical Observatory Rozhen.
3. Electronic pasha bulker clock What we give to the world is the question. This is the third answer. The prototype of the electronic wristwatch or the first completely new way to display time in 500 years was created by:
Petar Petrov say it is one of the most prolific inventors in the second half of XX century. Really? Why? What we know about the inventor of the digital alarm clock? pasha bulker Petar Petrov was born in Berkovica on October 21, 1919 In 1939, he enrolled in the Foreign Legion. Captured from the Germans and sent to POW camp in Poland. In 1941 he returned to Bulgaria and became pasha bulker a royal officer. In 1944 he went to Germany and studied engineering, mechanics and shipbuilding. Then built the first of their 60 boats. In 1951 he moved to Canada, then the United States. Works for American BBC. In 1956 goes to Indochina. There is engaged in the construction of bridges and power plants. Designed catamaran and headed to Melbourne, Florida. In 1959 he began to work with Aerospace. Since 1963, he worked for NASA program "Apollo" and rocket "Saturn." In 1968, he started his own business. His company Care Electrics and Care ilektriks developed the first wireless heart monitor pasha bulker used today in hospitals worldwide. In 1969, he created the prototype of the digital electronic wristwatch. Exactly 40 years ago! The watch was launched pasha bulker in 1971 with the brand Pulsar (Pulsar). In 1975 Petrov creates a new company. Began producing computers for monitoring pollution. Something interesting: electronic wristwatch Peter Petrov was sold in 1969 for the sum of $ 2,100. Now to answer the question Why? Among the inventions of Peter Petrov are: first digital handheld chaso

Sunday, May 4, 2014


IDG  •  PC World  •  Computerworld  •  CIO  •  CFO  •  Networkworld  •   •  towne air freight  • 
         PC PC HDD SSD    BPM ERP, CRM, BI CAD/CAM/CAE GIS       LAN & WAN    -    -   
1492 , 0
BACB Plus, - ( ), , , , . , . „ - , , , , . - , , ."
, , , , , . BACB Plus. , , , – SMS . 2000 ., , , , .
- , - , , , , „ ".
, ( , ), ( ), ( - ), . „ , , . , PIN SMS", .
, , „ " , - , Skype, , Facebooko , , o . " , - ( )", .
, . „ - , , - , ", , „ " . CRM , , .
„ ". Dropbox Goog

Saturday, May 3, 2014

Hipersvarzanostta storage unit auctions (Hyperconnectivity) is a factor that will affect markedly t


Blog Course Schedule Upcoming Events Archive seminars workshops Application Deployment storage unit auctions with Microsoft System Center 2012 Configuration Manager Haktivizim: Because storage unit auctions they do not like SYSTEM Active Directory Domain Service Role in Windows Server 2012 Unified Remote Access in Windows Server 2012 Hack The Hackers 2012 Forefront Protection for Exchange 2010 ITIL v3 2011 Windows Server 2008 R2 Security in the Cloud Unified Desktop Management & Forefront Endpoint Protection Information Security Fundamentals Botnets for Dummies Introduction to PowerShell Hack The Hackers 2011 Footprinting & Reconnaissance Linux SharePoint 2010 IT Pro SharePoint 2010 Developers Windows 7 Forefront TMG 2010 Worm Attacks Archive My IT career Regulation Awards Evaluation Committee Ranking FAQ Include All publications and your Certification New Horizons 30 years history Partners Team Nikolay Penev Iliana Dimitrova Lilia Nikolova Stefan Georgiev Dimitar Stoev Borislav Dinov Lubomir Mateev Rumen Dimitrov Vladislav Dekov Violeta Ivanova Elena Ianeva Zornitca Gecheva Jordan Parashkevov Sofia Momchilova Yavor Ivanov References New Horizons in the media Careers Hall Rentals Newsletter Contacts
Hipersvarzanostta storage unit auctions (Hyperconnectivity) is a factor that will affect markedly the volume of traffic on the IP network. In recent years it became clear that video applications storage unit auctions are often used alongside other applications running on the web. Users to access video applications at work, while engaged in other tasks or while doing several things at once (multitasking). The trend advocated by overflow of the Internet and television space outside the browser and PC (widgetization of Internet and TV).
Four are the main driving forces behind the growth of Hipersvarzanostta: broadband development, the development of digital screens - their size and resolution, the growing number of network-connected devices and the increasing power of computing devices.
Initiative Cisco Visual Index (VNI) is designed to track and predicted impact of video applications. With these lines we would like to briefly introduce VNI forecast for the development of video traffic by 2014. Complete information can be found in the "Cisco Visual Networking Index: Forecast and Methodology, 2009-2014" and "Hyperconnectivity and the Approaching Zettabyte Era".
Global IP traffic will exceed three-quarters of a zettabyte 2014 equivalent of the monthly web traffic in 2014 will be equivalent to 32 million people streamed "Avatar" in 3D, continuously, for the entire month. Global IP traffic will quadruple by 2014 By 2010, the global internet traffic video traffic will exceed peer-to-peer (P2P) and will reach nearly 40% of user traffic. By the end of 2010 the number of users of video applications will exceed 1 billion. Aggregate storage unit auctions traffic of all types of web video (TV, Internet, P2P, video on demand) will continue to constitute over 90% of global consumer traffic storage unit auctions and in 2014 3D and HD Internet video traffic will increase 23-fold by 2014 ., forming almost 50% of consumer Internet video traffic.
Recommended articles video in HTML5 without storage unit auctions Flash Player - Mission Possible! CERTIFY 2014: Get reward for your Microsoft exam at New Horizons row numbers in Excel, which can not be mixed sorting Do Windows storage unit auctions Server? Become Microsoft Certified and racing competition. What are the top trends in the IT market in the near future? Posted in Cisco Systems labeled IP, VNI by Dimitar storage unit auctions Stoev. Bookmark the permalink.
You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> storage unit auctions <strong>
First Name Last Name Email Most popular storage unit auctions Penetration Wi-Fi network: The Phantom Menace WPS Installation of Windows 7 quickly and drive Seminar: Predictive analyzes of clients Elena Bugova "business analyst storage unit auctions should always be aware of the expectations for the project" Word Advanced - create a table of contents Categories
(2)
(13)
(7)
(7)
(15)
(30)
(13)
Alexander Futekov Borislav Dinov Violeta Ivanova Vladislav Dekov Georgi Ivanov storage unit auctions Darin Jonchev Dimitar Stoev Elena Ianeva storage unit auctions Ivo Velitchkov Iliana storage unit auctions Dimitrova Jordan Parashkevov Lilia Nikolova Nikolay Penev Lyubomir Mateev Rumen Dimitrov Stefan Georgiev Archives January 2014 (6) February (7) May (4) April (4) January 2013 (12) February (8) July (7) June (7) May (12) May (8) April (7) August (4) September (10) October &

Friday, May 2, 2014

Relatively good level of protection most often began to use WPA2-Personal tmsa with CCMP (AES) encr


Blog Course Schedule Upcoming Events Archive seminars workshops Application Deployment with Microsoft System Center 2012 Configuration Manager Haktivizim: Because they do not like SYSTEM Active Directory Domain Service Role in Windows Server 2012 Unified Remote Access in Windows Server 2012 Hack The Hackers 2012 Forefront Protection for Exchange ITIL v3 2010 2011 Windows Server 2008 R2 Security in the Cloud Unified Desktop tmsa Management & Forefront Endpoint Protection Information Security Fundamentals Botnets for Dummies Introduction to PowerShell Hack The Hackers 2011 Footprinting & Reconnaissance Linux SharePoint 2010 IT Pro SharePoint 2010 Developers Windows 7 Forefront TMG 2010 Worm Attacks Archive My IT career Regulation Awards Evaluation Committee Ranking tmsa FAQ Include All publications and your Certification New Horizons 30 years history Partners Team Nikolay Penev Iliana tmsa Dimitrova Lilia Nikolova Stefan Georgiev Dimitar tmsa Stoev Borislav Dinov Lubomir Mateev tmsa Rumen Dimitrov Vladislav Dekov Violeta Ivanova Elena Ianeva Zornitca Gecheva Jordan Parashkevov Sofia Momchilova Yavor Ivanov References New Horizons in the media Careers Hall Rentals Newsletter Contacts
When we talk about security, not to mention the wireless network. They are all around us, in the office, parks, cafes, home. Thanks to them we manage to quickly and easily tmsa access needed us important information from anywhere and at any time. But have you ever thought what might happen if this information falls into the hands of someone, say, an attacker?
Wireless networks, such as removing the need for pure physical access to the network, you simply are in range. The only defense of our data remains cryptographic algorithm. The first one, used extensively in wireless networks is called WEP. Completely insecure nowadays and superseded by WPA and WPA2 protocols.
Relatively good level of protection most often began to use WPA2-Personal tmsa with CCMP (AES) encryption. Breaking of such a long and complex password (different symbols and font size) would take years of regular computer system. If the password changes every month, it becomes mission impossible.
Several years ago, Wi-Fi Alliance introduced standards WPS (Wi-Fi Protected Setup). It is designed to facilitate the setting and ensure the security of wireless home network. The characteristic tmsa feature is the presence of the 8-digit PIN code, which is unique for each wireless device and may not be changed.
Everything seemed fine, but at the end of December 2011 U.S. researchers found a dangerous vulnerability in the PIN of WPS. Usually to nick of code should be tried tens of millions of combinations, which requires a huge time. Hole in WPS reduces the number of combinations to 11,000.
The problem comes from the design and implementation of the standard. When entering an incorrect code, the system shows the validity of the first and second halves of the code separately. tmsa Last digit of the PIN code acts as a checksum. So the possible combinations are 10 4 + 10 3 = 11 000.
The vulnerability affects all manufacturers of wireless devices. The only way to protect ourselves is to stop completely WPS functionality. Another problem is that not all routers support this. The solution is to update firmware, and the latest version, if there function is not available, you can try and unofficial firmware (eg, dd-wrt, openwrt ...).
Tactical Network Solutions have developed a program tmsa called reaver-wps, in order to show that the attack is possible. In the next few lines I will demonstrate how to use in practice. You will see how easy it can be broken down otherwise unbreakable password. I also want to stress the fact that the penetration of private wireless networks is illegal in Bulgaria!
Demonstration will use Linux distribution Backtrack 5 R2, which is specifically tmsa designed to test the security of computer systems. Program Reaver-1.4 is preinstalled, but if you are using an older version of Backtrack or other distribution, you will need to download and install it. If something does not work when you could be the problem of Wi-Fi will make you. In this case, use the Broadcom 4318. The router is a Linksys E1000, which can not be stopped WPS functionality, as shown in the picture:
All listed networks are vulnerable. Each of them can be broken down for 4 to 10 hours. BSSID-it shows the MAC address of the wireless device that holds the network. We see the channel that is running, and the noise level. WPS Locked shows that WPS-A of a network is locked. Some routers tmsa have a defense, so with so many requests for PIN codes, stop for a few minutes WPS (WPS Lock). This slows down quite a bit attack.
3.'s Time to run Reaver in action. The syntax is very simple. A - b BSSID-ask it of the network test. Use-v, to show us PI

Thursday, May 1, 2014

Knox 2.0 Samsung Galaxy S5 . , Knox 2.0 A


Samsung Knox 2.0. Knox Samsung , .
, MWC 2014 , , , - . Samsung, , , . Knox , .
Samsung Galaxy S5 MWC 2014 Samsung Tizen Samsung Samsung Galaxy Grand Neo
, Knox 2.0 , - . Samsung:
- , TrustZone: , Trustzone PKCS#11; ;
- KNOX Key Store: TrustZone; , , ;
- (System Integrity): , , .
, Knox 2.0 Android Google Play Store. , "wrapping" . Knox 2.0 SE Android Good, SafeZone Fixmo, AppConnect MobileIron, HW- , Knox . - BYOD (Bring Your Oun Device) . UMC SEG , SEG MDM .
Knox 2.0 Samsung Galaxy S5 . , Knox 2.0 Android 4.4 KitKat. 
Samsung Galaxy S5 MWC 2014 Samsung canpar Tizen Samsung Samsung Galaxy Grand Neo
2015- Windows XP Symantec 62% 5- Xbox
Star Wars Episode VII VIVACOM Firefox 29 Iconia One 7 e - Atom- Acer Star Wars Samsung Star Wars Episode VII VIVACOM Firefox canpar 29 Iconia One 7 e - Atom- Acer Star Wars Samsung Galaxy S5 ASUS SATA Express PC- Windows canpar Phone Star Wars Episode VII VIVACOM Apple: Samsung 1,4 . Google Street View Samsung Ubuntu 14.04 LTS Wi-Fi 10 Gb/s 5-

News Headlines Urban Residential buildings Public buildings Interior Interviews Links Gates Golf Co

New Fashion in IT-th | Arhitektura.Bg
News Headlines Urban Residential buildings Public buildings Interior Interviews Links Gates Golf Courses Architecture Urban Gates CG-line magazine Foreign architects Blog Freelancers BG Studios Projects Product
Lately yjdf gjinf so happens that zachekvam serious topics related policies, strategies, revolutions and so slaboarhitekturni themes. Despite their commitment to architecture, perhaps some of you started to miss a purely architectural languages yjdf gjinf scratching around some bright or controversial representative yjdf gjinf of the architectural or interior design. Well, frankly - and I began to miss, so today will drive more mellow and will draw attention to the offices of the two IT giants - Cisco and Yandex. Actually, if you follow the new site, you may have already guessed what it is. However, if you feel in non-harvesting vineyard - here are some pictures of the two offices:
Photos: Maria Turynkina While some superficial browsing, comparing the two designs, wondering what the hell do they have in common, slightly trained eye tries to find ten differences. Do you see ten, because I can not? Absolutely stylistic coincidence same tretirovka spaces, using the technique "buildings into" or "room to room" equal treatment of color arrangement and so on. and so on. It could be assumed that one is seen by others and not to be outdone, have made "the same but slightly yjdf gjinf different" (says one professor). Reason question is - who by whom (or for short - only "who")? Interestingly, both offices are designed and built at the same time by different teams in different parts of the world, but to be more precise - at both opposite ends - the U.S. and Russia. Can major design companies have agents to spy on the competition, so act early? yjdf gjinf Moreover when we talk about competition between Russians yjdf gjinf and Americans? Before you ask me "Are you serious?" We hasten to share the words of a known architect (in unconfirmed reports - former frame services), "If yjdf gjinf you do not have shutters, yjdf gjinf windows wrapped with paper until you deliver the project; enemy does not sleep! "
Of course, personally, I've always believed in a far more rational nature of things. If it is possible in some cases actually be able to industrial espionage, it is here more explanation is quite a simple and devoid yjdf gjinf of conspiracy yjdf gjinf thinking - namely fashion. In recent times, including yjdf gjinf architecture and design of the offices of high-tech companies have a fashion that is quite ... "correct" if I may say so. Until recently multimillion business builded palaces of gold, glass skyscrapers, super-luxurious offices; demonstrated Wealth, status, power everything they could, including architecture and interior. With the advent of the information age, however, among these businesses rolled into the IT-th, yjdf gjinf which are mostly rebellious nature, refusing to fit into the whole shiny obliging atmosphere of the rich. Then privnesoha their mindset and environment they inhabit - designer, creative, kolaboratiovna, unassuming, surprising youthful - has dreamed of Architects keywords.
Not bad - I think. I'm sick of fathead-Baroque and pseudo-luxury. Time is a little bit to change the thinking of the rich and stop they like all the same "modern-baroque" eclecticism. Only purpose is Needed one more condition: fashion aytitata to carry over all the others. Is it contagious - be seen.
This posting was posted on Friday, February yjdf gjinf 28th, 2014 at 10:00 in the category of new projects. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or tracking URL from your own site. One Response to "New Fashion at IT-th" yjdf gjinf

The best of the worst Architecture = clothes? yjdf gjinf Architecture and Art Architecture and society Architecture and Politics ghetto BG BG BG hotels Concrete buildings Bulgarian houses Urban deconstruction Other Wood LSP - AMENDMENT Interior Quality Infrastructure CAD Architecture Competitions Houses Megastructures yjdf gjinf New Projects New buildings Lighting Find the ten differences Passive architecture of the world in the streets of New York on the streets of Prague in the streets of Sofia Introducing yjdf gjinf Old buildings / projects Glass Archive
March 2014 (1) February 2014 (3) January 2014 (2) December 2013 (1) November 2013 (3) October 2013 (3) September 2013 (3) August 2013 (1) July 2013 (5) June 2013