Skip to main content

Showing 1–5 of 5 results for author: Alexeev, N

Searching in archive q-bio. Search in all archives.
.
  1. arXiv:1911.11190  [pdf, other

    q-bio.GN cs.DS q-bio.QM

    Orienting Ordered Scaffolds: Complexity and Algorithms

    Authors: Sergey Aganezov, Pavel Avdeyev, Nikita Alexeev, Yongwu Rong, Max A. Alekseyev

    Abstract: Despite the recent progress in genome sequencing and assembly, many of the currently available assembled genomes come in a draft form. Such draft genomes consist of a large number of genomic fragments (scaffolds), whose order and/or orientation (i.e., strand) in the genome are unknown. There exist various scaffold assembly methods, which attempt to determine the order and orientation of scaffolds… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Journal ref: SN Computer Science 3 (2022), 308

  2. arXiv:1602.02841  [pdf, other

    q-bio.PE cs.DS math.CO

    Combinatorial Scoring of Phylogenetic Networks

    Authors: Nikita Alexeev, Max A. Alekseyev

    Abstract: Construction of phylogenetic trees and networks for extant species from their characters represents one of the key problems in phylogenomics. While solution to this problem is not always uniquely defined and there exist multiple methods for tree/network construction, it becomes important to measure how well the constructed networks capture the given character relationship across the species. In… ▽ More

    Submitted 8 August, 2016; v1 submitted 8 February, 2016; originally announced February 2016.

    Comments: 12 pages; 3 figures

    Journal ref: Lecture Notes in Computer Science 9797 (2016), 560-572

  3. arXiv:1510.08002  [pdf, other

    q-bio.GN math.PR q-bio.PE q-bio.QM

    Estimation of the True Evolutionary Distance under the Fragile Breakage Model

    Authors: Nikita Alexeev, Max A. Alekseyev

    Abstract: The ability to estimate the evolutionary distance between extant genomes plays a crucial role in many phylogenomic studies. Often such estimation is based on the parsimony assumption, implying that the distance between two genomes can be estimated as the rearrangement distance equal the minimal number of genome rearrangements required to transform one genome into the other. However, in reality the… ▽ More

    Submitted 25 May, 2017; v1 submitted 27 October, 2015; originally announced October 2015.

    Journal ref: BMC Genomics 18:Suppl 4 (2017), 356

  4. arXiv:1503.05285  [pdf, ps, other

    q-bio.GN math.CO

    Generalized Hultman Numbers and Cycle Structures of Breakpoint Graphs

    Authors: Nikita Alexeev, Anna Pologova, Max A. Alekseyev

    Abstract: Genome rearrangements can be modeled as $k$-breaks, which break a genome at k positions and glue the resulting fragments in a new order. In particular, reversals, translocations, fusions, and fissions are modeled as $2$-breaks, and transpositions are modeled as $3$-breaks. While $k$-break rearrangements for $k>3$ have not been observed in evolution, they are used in cancer genomics to model chromo… ▽ More

    Submitted 11 February, 2017; v1 submitted 18 March, 2015; originally announced March 2015.

    Journal ref: Journal of Computational Biology 24:2 (2017), 93-105

  5. arXiv:1501.07546  [pdf, other

    q-bio.GN math.CO math.PR q-bio.PE

    A Computational Method for the Rate Estimation of Evolutionary Transpositions

    Authors: Nikita Alexeev, Rustem Aidagulov, Max A. Alekseyev

    Abstract: Genome rearrangements are evolutionary events that shuffle genomic architectures. Most frequent genome rearrangements are reversals, translocations, fusions, and fissions. While there are some more complex genome rearrangements such as transpositions, they are rarely observed and believed to constitute only a small fraction of genome rearrangements happening in the course of evolution. The analysi… ▽ More

    Submitted 29 January, 2015; originally announced January 2015.

    Comments: Proceedings of the 3rd International Work-Conference on Bioinformatics and Biomedical Engineering (IWBBIO), 2015. (to appear)

    Journal ref: Lecture Notes in Computer Science 9043 (2015), pp. 471-480