TRUST4 | TCR and BCR assembly from RNA-seq data | Genomics library

 by   liulab-dfci C Version: v1.0.9 License: GPL-3.0

kandi X-RAY | TRUST4 Summary

kandi X-RAY | TRUST4 Summary

TRUST4 is a C library typically used in Artificial Intelligence, Genomics applications. TRUST4 has no vulnerabilities, it has a Strong Copyleft License and it has low support. However TRUST4 has 1 bugs. You can download it from GitHub.

Tcr Receptor Utilities for Solid Tissue (TRUST) is a computational tool to analyze TCR and BCR sequences using unselected RNA sequencing data, profiled from solid tissues, including tumors. TRUST4 performs de novo assembly on V, J, C genes including the hypervariable complementarity-determining region 3 (CDR3) and reports consensus of BCR/TCR sequences. TRUST4 then realigns the contigs to IMGT reference gene sequences to report the corresponding information. TRUST4 supports both single-end and paired-end sequencing data with any read length.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              TRUST4 has a low active ecosystem.
              It has 198 star(s) with 41 fork(s). There are 5 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 59 open issues and 112 have been closed. On average issues are closed in 15 days. There are 1 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of TRUST4 is v1.0.9

            kandi-Quality Quality

              TRUST4 has 1 bugs (0 blocker, 1 critical, 0 major, 0 minor) and 92 code smells.

            kandi-Security Security

              TRUST4 has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              TRUST4 code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              TRUST4 is licensed under the GPL-3.0 License. This license is Strong Copyleft.
              Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.

            kandi-Reuse Reuse

              TRUST4 releases are available to install and integrate.
              Installation instructions, examples and code snippets are available.
              It has 661 lines of code, 20 functions and 4 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of TRUST4
            Get all kandi verified functions for this library.

            TRUST4 Key Features

            No Key Features are available at this moment for TRUST4.

            TRUST4 Examples and Code Snippets

            No Code Snippets are available at this moment for TRUST4.

            Community Discussions

            QUESTION

            Why does the same OpenCL code have different outputs from Intel Xeon CPU and NVIDIA GTX 1080 Ti GPU?
            Asked 2019-Aug-27 at 15:46

            I am trying to parallelize Monte Carlo simulation by using OpenCL. I use the MWC64X as a uniform random number generator. The code runs well on different Intel CPUs, since the output of parallel computation is very close to the sequential one.

            ...

            ANSWER

            Answered 2019-Aug-27 at 15:31

            All use-cases of a pseudo-random number are a next-level challenge in true-[PARALLEL] computing platforms (not languages, platforms).

            Either,
            there is some source-of-randomness, which gets us into a trouble once massively-parallel requests are to get fair-handled in a truly [PARALLEL] fashion (here, hardware resources may help, yet at a cost of not being able to reproduce the same behaviour "outside" of this very same platform ( and moment-in-time, if such a source is not software-operated with some seed-injection feature, that may setup the "just"-pseudo-random algorithm that creates a pure-[SERIAL] sequence-of-produced "just"-pseudo-random numbers ) )

            Or,
            there is some "shared"-generator of pseudo-random numbers, which enjoys of a higher level of system-wide level-of-entropy (which is good for the resulting "quality" of pseudo-randomness) but at a cost of pure-serial dependence (no parallel execution possible,serial sequence gets served one after another in a sequential manner) and having close to zero chance for repeatable runs (a must for reproducible science) providing repeatably same sequences, needed for testing and for method-validation cases.

            RESUME :

            The code may employ a work-item-"private" pseudo-random generating function(s) ( privacy is a must for the sake of both the parallel code-execution and the mutual independence (non-intervening processes) of generating these pseudo-random numbers ) , yet each of instances must be a) independently initialised, so as to provide the expected level of randomness achievable in parallelised code-runs and b) any such initialisation ought be performed in a repeatably reproducible manner, for the sake of running the test on different times, often using different OpenCL target computing-platforms.

            For __kernel-s, that do not rely on hardware-specific sources-of-randomness, meeting the conditions a && b will suffice for receiving repeatably reproducible (same) results for testing "in vitro" and thus providing a reasonably random method for generating results during generic production-level use-case code-runs "in vivo".

            The comparison of net-run-times (benchmarked above) seems to show that Amdahl's law add-on overhead costs plus a tail-end effect of the atomicity-of-work have finally decided the net-run-time was ~ 3.6x faster on XEON compared to GPU:

            Source https://stackoverflow.com/questions/57665817

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install TRUST4

            Clone the [GitHub repo](https://github.com/liulab-dfci/TRUST4), e.g. with git clone https://github.com/liulab-dfci/TRUST4.git. Run make in the repo directory. You will find the executable files in the downloaded directory. If you want to run TRUST4 without specifying the directory, you can either add the directory of TRUST4 to the environment variable PATH or create a soft link ("ln -s") of the file "run-trust4" to a directory in PATH. TRUST4 depends on [pthreads](http://en.wikipedia.org/wiki/POSIX_Threads) and samtools depends on [zlib](http://en.wikipedia.org/wiki/Zlib). For MacOS, TRUST4 has been successfully compiled with gcc_darwin17.7.0 and gcc_9.2.0 installed by Homebrew. TRUST4 is also available form [Bioconda](https://anaconda.org/bioconda/trust4). You can install TRUST4 with conda install -c bioconda trust4.
            Clone the [GitHub repo](https://github.com/liulab-dfci/TRUST4), e.g. with git clone https://github.com/liulab-dfci/TRUST4.git
            Run make in the repo directory

            Support

            Create a [GitHub issue](https://github.com/liulab-dfci/TRUST4/issues).
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries

            Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link