WorldWideScience

Sample records for network computing 04-q1

  1. Image processing with massively parallel computer Quadrics Q1

    International Nuclear Information System (INIS)

    Della Rocca, A.B.; La Porta, L.; Ferriani, S.

    1995-05-01

    Aimed to evaluate the image processing capabilities of the massively parallel computer Quadrics Q1, a convolution algorithm that has been implemented is described in this report. At first the discrete convolution mathematical definition is recalled together with the main Q1 h/w and s/w features. Then the different codification forms of the algorythm are described and the Q1 performances are compared with those obtained by different computers. Finally, the conclusions report on main results and suggestions

  2. Spin networks and quantum computation

    International Nuclear Information System (INIS)

    Kauffman, L.; Lomonaco, S. Jr.

    2008-01-01

    We review the q-deformed spin network approach to Topological Quantum Field Theory and apply these methods to produce unitary representations of the braid groups that are dense in the unitary groups. The simplest case of these models is the Fibonacci model, itself universal for quantum computation. We here formulate these braid group representations in a form suitable for computation and algebraic work. (authors)

  3. Solving (1,q) KdV gravity

    International Nuclear Information System (INIS)

    Montano, D.; Rivlis, G.

    1991-01-01

    In this paper we explicitly compute the correlation functions of the (1, q) series of the KdV hierarchy, i.e. models with q-1 primary fields. We also find from algebraic considerations a ghost number conservation law for the (1, q) models. All the results in this paper follow from the algebraic properties of the KdV hierarchy without using any extraneous information from a field theory interpretation. We find the interesting result that some correlation functions vanish even when they conserve ghost number. This is an indication for further selection rules. (orig.)

  4. July 04, 2009

    Indian Academy of Sciences (India)

    2009-07-04 http://www.loksatta.com/daily/20090704/ch01.htm. #1. Leading International Marathi News Daily. Expressindia | The I ndian Express The Financial Express | City Newslines | Screen | Kashmir Live ||. Express Computer. | Network Mag az ine ndfa es usiness TravellerExpressP harmal Express Hospitality| Express ...

  5. q-state Potts-glass neural network based on pseudoinverse rule

    International Nuclear Information System (INIS)

    Xiong Daxing; Zhao Hong

    2010-01-01

    We study the q-state Potts-glass neural network with the pseudoinverse (PI) rule. Its performance is investigated and compared with that of the counterpart network with the Hebbian rule instead. We find that there exists a critical point of q, i.e., q cr =14, below which the storage capacity and the retrieval quality can be greatly improved by introducing the PI rule. We show that the dynamics of the neural networks constructed with the two learning rules respectively are quite different; but however, regardless of the learning rules, in the q-state Potts-glass neural networks with q≥3 there is a common novel dynamical phase in which the spurious memories are completely suppressed. This property has never been noticed in the symmetric feedback neural networks. Free from the spurious memories implies that the multistate Potts-glass neural networks would not be trapped in the metastable states, which is a favorable property for their applications.

  6. Dicty_cDB: FC-AI04 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available FC (Link to library) FC-AI04 (Link to dictyBase) - - - Contig-U15121-1 FC-AI04E (Li...nk to Original site) - - - - - - FC-AI04E 772 Show FC-AI04 Library FC (Link to library) Clone ID FC-AI04 (Li.../dictycdb.biol.tsukuba.ac.jp/CSM/FC/FC-AI/FC-AI04Q.Seq.d/ Representative seq. ID FC-AI...04E (Link to Original site) Representative DNA sequence >FC-AI04 (FC-AI04Q) /CSM/FC/FC-AI/FC-AI04Q.Seq....qvnkhqqvvtktvsd vlvphqvhnqvfphipqqmtlvnkhqpvvtktvsdvlvphqvhnqvfphtpqlkiqvylq vfqvvvvtiisai

  7. Solving the scalability issue in quantum-based refinement: Q|R#1.

    Science.gov (United States)

    Zheng, Min; Moriarty, Nigel W; Xu, Yanting; Reimers, Jeffrey R; Afonine, Pavel V; Waller, Mark P

    2017-12-01

    Accurately refining biomacromolecules using a quantum-chemical method is challenging because the cost of a quantum-chemical calculation scales approximately as n m , where n is the number of atoms and m (≥3) is based on the quantum method of choice. This fundamental problem means that quantum-chemical calculations become intractable when the size of the system requires more computational resources than are available. In the development of the software package called Q|R, this issue is referred to as Q|R#1. A divide-and-conquer approach has been developed that fragments the atomic model into small manageable pieces in order to solve Q|R#1. Firstly, the atomic model of a crystal structure is analyzed to detect noncovalent interactions between residues, and the results of the analysis are represented as an interaction graph. Secondly, a graph-clustering algorithm is used to partition the interaction graph into a set of clusters in such a way as to minimize disruption to the noncovalent interaction network. Thirdly, the environment surrounding each individual cluster is analyzed and any residue that is interacting with a particular cluster is assigned to the buffer region of that particular cluster. A fragment is defined as a cluster plus its buffer region. The gradients for all atoms from each of the fragments are computed, and only the gradients from each cluster are combined to create the total gradients. A quantum-based refinement is carried out using the total gradients as chemical restraints. In order to validate this interaction graph-based fragmentation approach in Q|R, the entire atomic model of an amyloid cross-β spine crystal structure (PDB entry 2oNA) was refined.

  8. Exit probability of the one-dimensional q-voter model: Analytical results and simulations for large networks

    Science.gov (United States)

    Timpanaro, André M.; Prado, Carmen P. C.

    2014-05-01

    We discuss the exit probability of the one-dimensional q-voter model and present tools to obtain estimates about this probability, both through simulations in large networks (around 107 sites) and analytically in the limit where the network is infinitely large. We argue that the result E(ρ )=ρq/ρq+(1-ρ)q, that was found in three previous works [F. Slanina, K. Sznajd-Weron, and P. Przybyła, Europhys. Lett. 82, 18006 (2008), 10.1209/0295-5075/82/18006; R. Lambiotte and S. Redner, Europhys. Lett. 82, 18007 (2008), 10.1209/0295-5075/82/18007, for the case q =2; and P. Przybyła, K. Sznajd-Weron, and M. Tabiszewski, Phys. Rev. E 84, 031117 (2011), 10.1103/PhysRevE.84.031117, for q >2] using small networks (around 103 sites), is a good approximation, but there are noticeable deviations that appear even for small systems and that do not disappear when the system size is increased (with the notable exception of the case q =2). We also show that, under some simple and intuitive hypotheses, the exit probability must obey the inequality ρq/ρq+(1-ρ)≤E(ρ)≤ρ/ρ +(1-ρ)q in the infinite size limit. We believe this settles in the negative the suggestion made [S. Galam and A. C. R. Martins, Europhys. Lett. 95, 48005 (2001), 10.1209/0295-5075/95/48005] that this result would be a finite size effect, with the exit probability actually being a step function. We also show how the result that the exit probability cannot be a step function can be reconciled with the Galam unified frame, which was also a source of controversy.

  9. A Quantitative Electrophysiological Biomarker of Duplication 15q11.2-q13.1 Syndrome.

    Directory of Open Access Journals (Sweden)

    Joel Frohlich

    Full Text Available Duplications of 15q11.2-q13.1 (Dup15q syndrome are highly penetrant for autism spectrum disorder (ASD. A distinct electrophysiological (EEG pattern characterized by excessive activity in the beta band has been noted in clinical reports. We asked whether EEG power in the beta band, as well as in other frequency bands, distinguished children with Dup15q syndrome from those with non-syndromic ASD and then examined the clinical correlates of this electrophysiological biomarker in Dup15q syndrome.In the first study, we recorded spontaneous EEG from children with Dup15q syndrome (n = 11, age-and-IQ-matched children with ASD (n = 10 and age-matched typically developing (TD children (n = 9 and computed relative power in 6 frequency bands for 9 regions of interest (ROIs. Group comparisons were made using a repeated measures analysis of variance. In the second study, we recorded spontaneous EEG from a larger cohort of individuals with Dup15q syndrome (n = 27 across two sites and examined age, epilepsy, and duplication type as predictors of beta power using simple linear regressions.In the first study, spontaneous beta1 (12-20 Hz and beta2 (20-30 Hz power were significantly higher in Dup15q syndrome compared with both comparison groups, while delta (1-4 Hz was significantly lower than both comparison groups. Effect sizes in all three frequency bands were large (|d| > 1. In the second study, we found that beta2 power was significantly related to epilepsy diagnosis in Dup15q syndrome.Here, we have identified an electrophysiological biomarker of Dup15q syndrome that may facilitate clinical stratification, treatment monitoring, and measurement of target engagement for future clinical trials. Future work will investigate the genetic and neural underpinnings of this electrophysiological signature as well as the functional consequences of excessive beta oscillations in Dup15q syndrome.

  10. Memristive Computational Architecture of an Echo State Network for Real-Time Speech Emotion Recognition

    Science.gov (United States)

    2015-05-28

    recognition is simpler and requires less computational resources compared to other inputs such as facial expressions . The Berlin database of Emotional ...Processing Magazine, IEEE, vol. 18, no. 1, pp. 32– 80, 2001. [15] K. R. Scherer, T. Johnstone, and G. Klasmeyer, “Vocal expression of emotion ...Network for Real-Time Speech- Emotion Recognition 5a. CONTRACT NUMBER IN-HOUSE 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 62788F 6. AUTHOR(S) Q

  11. A.Q. Khan Nuclear Smuggling Network

    Directory of Open Access Journals (Sweden)

    Molly MacCalman

    2016-03-01

    Full Text Available Abdul Qadeer Khan, widely viewed as the father of Pakistan’s nuclear weapons program, was arrested on January 31, 2004 for his key role in the black market sale of nuclear technology and equipment to Iran, North Korea, Libya, and possibly others. A.Q. Khan’s nuclear smuggling network prospered throughout the 1980s and 1990s and was linked to middlemen and businesses in over 20 countries. The network offered buyers a menu of both technical expertise and materials with prices ranging from millions to hundreds of millions of dollars. The Khan network was ultimately exposed largely due to years of intelligence gathering by the United States and the United Kingdom. However, very few of the network’s members have been successfully prosecuted and the demand for nuclear material by both state and non-state actors continues. The exposure of Khan’s network confirmed that a non-state actor could procure and sell a turnkey nuclear weapons program to willing buyers.

  12. Robot soccer action selection based on Q learning

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper researches robot soccer action selection based on Q learning . The robot learn to activate particular behavior given their current situation and reward signal. We adopt neural network to implementations of Q learning for their generalization properties and limited computer memory requirements

  13. Visual Pretraining for Deep Q-Learning

    OpenAIRE

    Sandven, Torstein

    2016-01-01

    Recent advances in reinforcement learning enable computers to learn human level polices for Atari 2600 games. This is done by training a convolutional neural network to play based on screenshots and in-game rewards. The network is referred to as a deep Q-network (DQN). The main disadvantage to this approach is a long training time. A computer will typically learn for approximately one week. In this time it processes 38 days of game play. This thesis explores the possibility of using visual pr...

  14. Mapping the q-voter model: From a single chain to complex networks

    Science.gov (United States)

    Jȩdrzejewski, Arkadiusz; Sznajd-Weron, Katarzyna; Szwabiński, Janusz

    2016-03-01

    We propose and compare six different ways of mapping the modified q-voter model to complex networks. Considering square lattices, Barabási-Albert, Watts-Strogatz and real Twitter networks, we ask the question if always a particular choice of the group of influence of a fixed size q leads to different behavior at the macroscopic level. Using Monte Carlo simulations we show that the answer depends on the relative average path length of the network and for real-life topologies the differences between the considered mappings may be negligible.

  15. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria. Version 1.

    Science.gov (United States)

    1987-07-01

    for Secure Computer Systema, MTR-3153, The MITRE Corporation, Bedford, MA, June 1975. 1 See, for example, M. D. Abrams and H. J. Podell , Tutorial...References References Abrams, M. D. and H. J. Podell , Tutorial: Computer and Network Security, IEEE Com- puter Society Press, 1987. Addendum to the

  16. Computation of the q -th roots of circulant matrices

    Directory of Open Access Journals (Sweden)

    Pakizeh Mohammadi Khanghah

    2014-05-01

    Full Text Available In this paper‎, ‎we investigate the reduced form of circulant matrices‎ ‎and we show that the problem of computing the $q$-th roots of a‎ ‎nonsingular circulant matrix $A$ can be reduced to that of computing‎ ‎the $q$-th roots of two half size matrices $B-C$ and $B+C$. 

  17. Genetic variants at chromosomes 2q35, 5p12, 6q25.1, 10q26.13, and 16q12.1 influence the risk of breast cancer in men.

    Directory of Open Access Journals (Sweden)

    Nick Orr

    2011-09-01

    Full Text Available Male breast cancer accounts for approximately 1% of all breast cancer. To date, risk factors for male breast cancer are poorly defined, but certain risk factors and genetic features appear common to both male and female breast cancer. Genome-wide association studies (GWAS have recently identified common single nucleotide polymorphisms (SNPs that influence female breast cancer risk; 12 of these have been independently replicated. To examine if these variants contribute to male breast cancer risk, we genotyped 433 male breast cancer cases and 1,569 controls. Five SNPs showed a statistically significant association with male breast cancer: rs13387042 (2q35 (odds ratio (OR  = 1.30, p = 7.98×10⁻⁴, rs10941679 (5p12 (OR = 1.26, p = 0.007, rs9383938 (6q25.1 (OR = 1.39, p = 0.004, rs2981579 (FGFR2 (OR = 1.18, p = 0.03, and rs3803662 (TOX3 (OR = 1.48, p = 4.04×10⁻⁶. Comparing the ORs for male breast cancer with the published ORs for female breast cancer, three SNPs--rs13387042 (2q35, rs3803662 (TOX3, and rs6504950 (COX11--showed significant differences in ORs (p<0.05 between sexes. Breast cancer is a heterogeneous disease; the relative risks associated with loci identified to date show subtype and, based on these data, gender specificity. Additional studies of well-defined patient subgroups could provide further insight into the biological basis of breast cancer development.

  18. Parallel computing and networking; Heiretsu keisanki to network

    Energy Technology Data Exchange (ETDEWEB)

    Asakawa, E; Tsuru, T [Japan National Oil Corp., Tokyo (Japan); Matsuoka, T [Japan Petroleum Exploration Co. Ltd., Tokyo (Japan)

    1996-05-01

    This paper describes the trend of parallel computers used in geophysical exploration. Around 1993 was the early days when the parallel computers began to be used for geophysical exploration. Classification of these computers those days was mainly MIMD (multiple instruction stream, multiple data stream), SIMD (single instruction stream, multiple data stream) and the like. Parallel computers were publicized in the 1994 meeting of the Geophysical Exploration Society as a `high precision imaging technology`. Concerning the library of parallel computers, there was a shift to PVM (parallel virtual machine) in 1993 and to MPI (message passing interface) in 1995. In addition, the compiler of FORTRAN90 was released with support implemented for data parallel and vector computers. In 1993, networks used were Ethernet, FDDI, CDDI and HIPPI. In 1995, the OC-3 products under ATM began to propagate. However, ATM remains to be an interoffice high speed network because the ATM service has not spread yet for the public network. 1 ref.

  19. Introduction to computer networking

    CERN Document Server

    Robertazzi, Thomas G

    2017-01-01

    This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional. • Features a concise, accessible treatment of computer networking, focusing on new technological topics; • Provides non-mathematical introduction to networks in their most common forms today;< • Includes new developments in switching, optical networks, WiFi, Bluetooth, LTE, 5G, and quantum cryptography.

  20. On the Hopf structure of Up,q(gl(1/1)) and the universal Τ-matrix of Funp,q(GL(1/1))

    International Nuclear Information System (INIS)

    Chakrabarti, R.; Jagannathan, R.

    1994-08-01

    Using the technique developed by Fronsdal and Galindo (Lett. Math. Phys, 27 (1993) 57) for studying the Hopf duality between the quantum algebras Fun p,q (GL(2)) and U p,q (gl(2)), the Hopf structure of U p,q (gl(1/1)), dual to Fun p,q (GL(1/1)), is derived and the corresponding universal Τ-matrix of Fun p,q (GL(1/1)), embodying the suitably modified exponential relationship U p,q (gl(1/1)) → Fun p,q (GL(1/1)), is obtained. (author). 10 refs

  1. Network survivability performance (computer diskette)

    Science.gov (United States)

    1993-11-01

    File characteristics: Data file; 1 file. Physical description: 1 computer diskette; 3 1/2 in.; high density; 2.0MB. System requirements: Mac; Word. This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunication networks to user expectations for network survivability.

  2. Copy number variations in 6q14.1 and 5q13.2 are associated with alcohol dependence.

    Science.gov (United States)

    Lin, Peng; Hartz, Sarah M; Wang, Jen-Chyong; Agrawal, Arpana; Zhang, Tian-Xiao; McKenna, Nicholas; Bucholz, Kathleen; Brooks, Andrew I; Tischfield, Jay A; Edenberg, Howard J; Hesselbrock, Victor M; Kramer, John R; Kuperman, Samuel; Schuckit, Marc A; Goate, Alison M; Bierut, Laura J; Rice, John P

    2012-09-01

    Excessive alcohol use is the third leading cause of preventable death and is highly correlated with alcohol dependence, a heritable phenotype. Many genetic factors for alcohol dependence have been found, but many remain unknown. In search of additional genetic factors, we examined the association between Diagnostic and StatisticalManual of Mental Disorders, Fourth Edition (DSM-IV) alcohol dependence and all common copy number variations (CNVs) with good reliability in the Study of Addiction: Genetics and Environment (SAGE). All participants in SAGE were interviewed using the Semi-Structured Assessment for the Genetics of Alcoholism, as a part of 3 contributing studies. A total of 2,610 non-Hispanic European American samples were genotyped on the Illumina Human 1M array. We performed CNV calling by CNVPartition, PennCNV, and QuantiSNP, and only CNVs identified by all 3 software programs were examined. Association was conducted with the CNV (as a deletion/duplication) as well as with probes in the CNV region. Quantitative polymerase chain reaction (qPCR) was used to validate the CNVs in the laboratory. CNVs in 6q14.1 (p = 1.04 × 10(-6)) and 5q13.2 (p = 3.37 × 10(-4)) were significantly associated with alcohol dependence after adjusting multiple tests. On chromosome 5q13.2, there were multiple candidate genes previously associated with various neurological disorders. The region on chromosome 6q14.1 is a gene desert that has been associated with mental retardation and language delay. The CNV in 5q13.2 was validated, whereas only a component of the CNV on 6q14.1 was validated by qPCR. Thus, the CNV on 6q14.1 should be viewed with caution. This is the first study to show an association between DSM-IV alcohol dependence and CNVs. CNVs in regions previously associated with neurological disorders may be associated with alcohol dependence. Copyright © 2012 by the Research Society on Alcoholism.

  3. Attenuation (1/Q) estimation in reflection seismic records

    International Nuclear Information System (INIS)

    Raji, Wasiu; Rietbrock, Andreas

    2013-01-01

    Despite its numerous potential applications, the lack of a reliable method for determining attenuation (1/Q) in seismic data is an issue when utilizing attenuation for hydrocarbon exploration. In this paper, a new method for measuring attenuation in reflection seismic data is presented. The inversion process involves two key stages: computation of the centroid frequency for the individual signal using a variable window length and fast Fourier transform; and estimation of the difference in the centroid frequency and travel time for paired incident and transmitted signals. The new method introduces a shape factor and a constant which allows several spectral shapes to be used to represent a real seismic signal without altering the mathematical model. Application of the new method to synthetic data shows that it can provide reliable estimates of Q using any of the spectral shapes commonly assumed for real seismic signals. Tested against two published methods of Q measurement, the new method shows less sensitivity to interference from noise and change of frequency bandwidth. The method is also applied to a 3D data set from the Gullfaks field, North Sea, Norway. The trace length is divided into four intervals: AB, BC, CD, and DE. Results show that interval AB has the lowest 1/Q value, and that interval BC has the highest 1/Q value. The values of 1/Q measured in the CDP stack using the new method are consistent with those measured using the classical spectral ratio method. (paper)

  4. PARA'04, State-of-the-art in scientific computing

    DEFF Research Database (Denmark)

    Madsen, Kaj; Wasniewski, Jerzy

    This meeting in the series, the PARA'04 Workshop with the title ``State of the Art in Scientific Computing'', was held in Lyngby, Denmark, June 20-23, 2004. The PARA'04 Workshop was organized by Jack Dongarra from the University of Tennessee and Oak Ridge National Laboratory, and Kaj Madsen and J...

  5. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  6. NCBI nr-aa BLAST: CBRC-MDOM-04-0428 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-MDOM-04-0428 ref|NP_001033642.1| progestin and adipoQ receptor family member V...II [Bos taurus] gb|AAI11285.1| Progestin and adipoQ receptor family member VII [Bos taurus] NP_001033642.1 1e-149 76% ...

  7. 1st International Conference on Signal, Networks, Computing, and Systems

    CERN Document Server

    Mohapatra, Durga; Nagar, Atulya; Sahoo, Manmath

    2016-01-01

    The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25–27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

  8. Domain wall networks on solitons

    International Nuclear Information System (INIS)

    Sutcliffe, Paul

    2003-01-01

    Domain wall networks on the surface of a soliton are studied in a simple theory. It consists of two complex scalar fields, in 3+1 dimensions, with a global U(1)xZ n symmetry, where n>2. Solutions are computed numerically in which one of the fields forms a Q ball and the other field forms a network of domain walls localized on the surface of the Q ball. Examples are presented in which the domain walls lie along the edges of a spherical polyhedron, forming junctions at its vertices. It is explained why only a small restricted class of polyhedra can arise as domain wall networks

  9. BONFIRE: benchmarking computers and computer networks

    OpenAIRE

    Bouckaert, Stefan; Vanhie-Van Gerwen, Jono; Moerman, Ingrid; Phillips, Stephen; Wilander, Jerker

    2011-01-01

    The benchmarking concept is not new in the field of computing or computer networking. With “benchmarking tools”, one usually refers to a program or set of programs, used to evaluate the performance of a solution under certain reference conditions, relative to the performance of another solution. Since the 1970s, benchmarking techniques have been used to measure the performance of computers and computer networks. Benchmarking of applications and virtual machines in an Infrastructure-as-a-Servi...

  10. Classroom Computer Network.

    Science.gov (United States)

    Lent, John

    1984-01-01

    This article describes a computer network system that connects several microcomputers to a single disk drive and one copy of software. Many schools are switching to networks as a cheaper and more efficient means of computer instruction. Teachers may be faced with copywriting problems when reproducing programs. (DF)

  11. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  12. Computing networks from cluster to cloud computing

    CERN Document Server

    Vicat-Blanc, Pascale; Guillier, Romaric; Soudan, Sebastien

    2013-01-01

    "Computing Networks" explores the core of the new distributed computing infrastructures we are using today:  the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these different infrastructures' communication systems. Cloud Computing will give the possibility for millions of users to process data anytime, anywhere, while being eco-friendly. In order to deliver this emerging traffic in a timely, cost-efficient, energy-efficient, and

  13. Searching for axion stars and Q-balls with a terrestrial magnetometer network

    Energy Technology Data Exchange (ETDEWEB)

    Jackson Kimball, D. F. [Cal State, East Bay; Budker, D. [UC, Berkeley; Eby, J. [Fermilab; Pospelov, M. [Perimeter Inst. Theor. Phys.; Pustelny, S. [Jagiellonian U.; Scholtes, T. [Fribourg U.; Stadnik, Y. V. [Helmholtz Inst., Mainz; Weis, A. [Fribourg U.; Wickenbrock, A. [Mainz U.

    2017-10-11

    Light (pseudo-)scalar fields are promising candidates to be the dark matter in the Universe. Under certain initial conditions in the early Universe and/or with certain types of self-interactions, they can form compact dark-matter objects such as axion stars or Q-balls. Direct encounters with such objects can be searched for by using a global network of atomic magnetometers. It is shown that for a range of masses and radii not ruled out by existing observations, the terrestrial encounter rate with axion stars or Q-balls can be sufficiently high (at least once per year) for a detection. Furthermore, it is shown that a global network of atomic magnetometers is sufficiently sensitive to pseudoscalar couplings to atomic spins so that a transit through an axion star or Q-ball could be detected over a broad range of unexplored parameter space.

  14. An affected core drives network integration deficits of the structural connectome in 22q11.2 deletion syndrome

    Directory of Open Access Journals (Sweden)

    František Váša

    2016-01-01

    Full Text Available Chromosome 22q11.2 deletion syndrome (22q11DS is a genetic disease known to lead to cerebral structural alterations, which we study using the framework of the macroscopic white-matter connectome. We create weighted connectomes of 44 patients with 22q11DS and 44 healthy controls using diffusion tensor magnetic resonance imaging, and perform a weighted graph theoretical analysis. After confirming global network integration deficits in 22q11DS (previously identified using binary connectomes, we identify the spatial distribution of regions responsible for global deficits. Next, we further characterize the dysconnectivity of the deficient regions in terms of sub-network properties, and investigate their relevance with respect to clinical profiles. We define the subset of regions with decreased nodal integration (evaluated using the closeness centrality measure as the affected core (A-core of the 22q11DS structural connectome. A-core regions are broadly bilaterally symmetric and consist of numerous network hubs — chiefly parietal and frontal cortical, as well as subcortical regions. Using a simulated lesion approach, we demonstrate that these core regions and their connections are particularly important to efficient network communication. Moreover, these regions are generally densely connected, but less so in 22q11DS. These specific disturbances are associated to a rerouting of shortest network paths that circumvent the A-core in 22q11DS, “de-centralizing” the network. Finally, the efficiency and mean connectivity strength of an orbito-frontal/cingulate circuit, included in the affected regions, correlate negatively with the extent of negative symptoms in 22q11DS patients, revealing the clinical relevance of present findings. The identified A-core overlaps numerous regions previously identified as affected in 22q11DS as well as in schizophrenia, which approximately 30–40% of 22q11DS patients develop.

  15. NCBI nr-aa BLAST: CBRC-DDIS-04-0058 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-DDIS-04-0058 ref|YP_080398.1| Metallophosphoesterase [Bacillus licheniformis A...TCC 14580] ref|YP_092816.1| YkoQ [Bacillus licheniformis ATCC 14580] gb|AAU24760.1| Metallophosphoesterase [Bacillus lichen...iformis ATCC 14580] gb|AAU42123.1| YkoQ [Bacillus licheniformis DSM 13] YP_080398.1 2e-10 31% ...

  16. Discrete-state phasor neural networks

    Science.gov (United States)

    Noest, André J.

    1988-08-01

    An associative memory network with local variables assuming one of q equidistant positions on the unit circle (q-state phasors) is introduced, and its recall behavior is solved exactly for any q when the interactions are sparse and asymmetric. Such models can describe natural or artifical networks of (neuro-)biological, chemical, or electronic limit-cycle oscillators with q-fold instead of circular symmetry, or similar optical computing devices using a phase-encoded data representation.

  17. Q-Speciation and Network Structure Evolution in Invert Calcium Silicate Glasses.

    Science.gov (United States)

    Kaseman, Derrick C; Retsinas, A; Kalampounias, A G; Papatheodorou, G N; Sen, S

    2015-07-02

    Binary silicate glasses in the system CaO-SiO2 are synthesized over an extended composition range (42 mol % ≤ CaO ≤ 61 mol %), using container-less aerodynamic levitation techniques and CO2-laser heating. The compositional evolution of Q speciation in these glasses is quantified using (29)Si and (17)O magic angle spinning nuclear magnetic resonance spectroscopy. The results indicate progressive depolymerization of the silicate network upon addition of CaO and significant deviation of the Q speciation from the binary model. The equilibrium constants for the various Q species disproportionation reactions for these glasses are found to be similar to (much smaller than) those characteristic of Li (Mg)-silicate glasses, consistent with the corresponding trends in the field strengths of these modifier cations. Increasing CaO concentration results in an increase in the packing density and structural rigidity of these glasses and consequently in their glass transition temperature Tg. This apparent role reversal of conventional network-modifying cations in invert alkaline-earth silicate glasses are compared and contrasted with that in their alkali silicate counterparts.

  18. De novo microdeletions of chromosome 6q14.1-q14.3 and 6q12.1-q14.1 in two patients with intellectual disability - further delineation of the 6q14 microdeletion syndrome and review of the literature

    DEFF Research Database (Denmark)

    Becker, Kerstin; Di Donato, Nataliya; Holder-Espinasse, Muriel

    2012-01-01

    with broad nasal tip, anteverted nares, long philtrum, and thin upper lip. In this study we describe two patients with overlapping 6q14 deletions presenting with developmental delay and characteristic dysmorphism. Molecular karyotyping using array CGH analysis revealed a de novo 8.9 Mb deletion at 6q14.1-q14.......3 and a de novo 11.3 Mb deletion at 6q12.1-6q14.1, respectively. We provide a review of the clinical features of twelve other patients with 6q14 deletions detected by array CGH analysis. By assessing all reported data we could not identify a single common region of deletion. Possible candidate genes in 6q14...

  19. Computer networks and advanced communications

    International Nuclear Information System (INIS)

    Koederitz, W.L.; Macon, B.S.

    1992-01-01

    One of the major methods for getting the most productivity and benefits from computer usage is networking. However, for those who are contemplating a change from stand-alone computers to a network system, the investigation of actual networks in use presents a paradox: network systems can be highly productive and beneficial; at the same time, these networks can create many complex, frustrating problems. The issue becomes a question of whether the benefits of networking are worth the extra effort and cost. In response to this issue, the authors review in this paper the implementation and management of an actual network in the LSU Petroleum Engineering Department. The network, which has been in operation for four years, is large and diverse (50 computers, 2 sites, PC's, UNIX RISC workstations, etc.). The benefits, costs, and method of operation of this network will be described, and an effort will be made to objectively weigh these elements from the point of view of the average computer user

  20. A community Q&A for HEP Software and Computing ?

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    How often do you use StackOverflow or ServerFault to find information in your daily work? Would you be interested in a community Q&A site for HEP Software and Computing, for instance a dedicated StackExchange site? I looked into this question...

  1. Analysis of autism susceptibility gene loci on chromosomes 1p, 4p, 6q, 7q, 13q, 15q, 16p, 17q, 19q and 22q in Finnish multiplex families.

    Science.gov (United States)

    Auranen, M; Nieminen, T; Majuri, S; Vanhala, R; Peltonen, L; Järvelä, I

    2000-05-01

    The role of genetic factors in the etiology of the autistic spectrum of disorders has clearly been demonstrated. Ten chromosomal regions, on chromosomes 1p, 4p, 6q, 7q, 13q, 15q, 16p, 17q, 19q and 22q have potentially been linked to autism.1-8 We have analyzed these chromosomal regions in a total of 17 multiplex families with autism originating from the isolated Finnish population by pairwise linkage analysis and sib-pair analysis. Mild evidence for putative contribution was found only with the 1p chromosomal region in the susceptibility to autism. Our data suggest that additional gene loci exist for autism which will be detectable in and even restricted to the isolated Finnish population.

  2. MicroRNA Dysregulation, Gene Networks, and Risk for Schizophrenia in 22q11.2 Deletion Syndrome

    Science.gov (United States)

    Merico, Daniele; Costain, Gregory; Butcher, Nancy J.; Warnica, William; Ogura, Lucas; Alfred, Simon E.; Brzustowicz, Linda M.; Bassett, Anne S.

    2014-01-01

    The role of microRNAs (miRNAs) in the etiology of schizophrenia is increasingly recognized. Microdeletions at chromosome 22q11.2 are recurrent structural variants that impart a high risk for schizophrenia and are found in up to 1% of all patients with schizophrenia. The 22q11.2 deletion region overlaps gene DGCR8, encoding a subunit of the miRNA microprocessor complex. We identified miRNAs overlapped by the 22q11.2 microdeletion and for the first time investigated their predicted target genes, and those implicated by DGCR8, to identify targets that may be involved in the risk for schizophrenia. The 22q11.2 region encompasses seven validated or putative miRNA genes. Employing two standard prediction tools, we generated sets of predicted target genes. Functional enrichment profiles of the 22q11.2 region miRNA target genes suggested a role in neuronal processes and broader developmental pathways. We then constructed a protein interaction network of schizophrenia candidate genes and interaction partners relevant to brain function, independent of the 22q11.2 region miRNA mechanisms. We found that the predicted gene targets of the 22q11.2 deletion miRNAs, and targets of the genome-wide miRNAs predicted to be dysregulated by DGCR8 hemizygosity, were significantly represented in this schizophrenia network. The findings provide new insights into the pathway from 22q11.2 deletion to expression of schizophrenia, and suggest that hemizygosity of the 22q11.2 region may have downstream effects implicating genes elsewhere in the genome that are relevant to the general schizophrenia population. These data also provide further support for the notion that robust genetic findings in schizophrenia may converge on a reasonable number of final pathways. PMID:25484875

  3. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  4. CX: A Scalable, Robust Network for Parallel Computing

    Directory of Open Access Journals (Sweden)

    Peter Cappello

    2002-01-01

    Full Text Available CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, eager scheduling, and space-based coordination. The object-oriented API is simple, compact, and cleanly separates application logic from the logic that supports interprocess communication and fault tolerance. Computations, of course, run to completion in the presence of computational hosts that join and leave the ongoing computation. Such hosts, or producers, use task caching and prefetching to overlap computation with interprocessor communication. To break a potential task server bottleneck, a network of task servers is presented. Even though task servers are envisioned as reliable, the self-organizing, scalable network of n- servers, described as a sibling-connected height-balanced fat tree, tolerates a sequence of n-1 server failures. Tasks are distributed throughout the server network via a simple "diffusion" process. CX is intended as a test bed for research on automated silent auctions, reputation services, authentication services, and bonding services. CX also provides a test bed for algorithm research into network-based parallel computation.

  5. Networking DEC and IBM computers

    Science.gov (United States)

    Mish, W. H.

    1983-01-01

    Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.

  6. Network Restoration for Next-Generation Communication and Computing Networks

    Directory of Open Access Journals (Sweden)

    B. S. Awoyemi

    2018-01-01

    Full Text Available Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the network as possible. Emerging next-generation (xG communication and computing networks such as fifth-generation networks, software-defined networks, and internet-of-things networks have promises of fast speeds, impressive data rates, and remarkable reliability. To achieve these promises, these complex and dynamic xG networks must be built with low failure possibilities, high network restoration capacity, and quick failure recovery capabilities. Hence, improved network restoration models have to be developed and incorporated in their design. In this paper, a comprehensive study on network restoration mechanisms that are being developed for addressing network failures in current and emerging xG networks is carried out. Open-ended problems are identified, while invaluable ideas for better adaptation of network restoration to evolving xG communication and computing paradigms are discussed.

  7. On the q-exponential of matrix q-Lie algebras

    Directory of Open Access Journals (Sweden)

    Ernst Thomas

    2017-01-01

    Full Text Available In this paper, we define several new concepts in the borderline between linear algebra, Lie groups and q-calculus.We first introduce the ring epimorphism r, the set of all inversions of the basis q, and then the important q-determinant and corresponding q-scalar products from an earlier paper. Then we discuss matrix q-Lie algebras with a modified q-addition, and compute the matrix q-exponential to form the corresponding n × n matrix, a so-called q-Lie group, or manifold, usually with q-determinant 1. The corresponding matrix multiplication is twisted under τ, which makes it possible to draw diagrams similar to Lie group theory for the q-exponential, or the so-called q-morphism. There is no definition of letter multiplication in a general alphabet, but in this article we introduce new q-number systems, the biring of q-integers, and the extended q-rational numbers. Furthermore, we provide examples of matrices in suq(4, and its corresponding q-Lie group. We conclude with an example of system of equations with Ward number coeficients.

  8. Study of b anti-b Production in e+e- Annihilation at S**(1/2) = 29-GeV with the Aid of Neural Networks

    International Nuclear Information System (INIS)

    Lambert, D.

    2003-01-01

    We present a measurement of σ(b(bar b))/σ(q(bar q)) in the annihilation process e + e - → q(bar q) → hadrons at √s = 29 GeV. The analysis is based on 66 pb -1 of data collected between 1984 and 1986 with the TPC/2γ detector at PEP. To identify bottom events, we use a neural network with inputs that are computed from the 3-momenta of all of the observed charged hadrons in each event. We also present a study of bias in techniques for measuring inclusive π ± , K ± , and p/(bar p) production in the annihilation process e + e - → b(bar b) → hadrons at √s = 29 GeV, using a neural network to identify bottom-quark jets. In this study, charged particles are identified by a simultaneous measurement of momentum and ionization energy loss (dE/dx)

  9. Evolving ATLAS Computing For Today’s Networks

    CERN Document Server

    Campana, S; The ATLAS collaboration; Jezequel, S; Negri, G; Serfon, C; Ueda, I

    2012-01-01

    The ATLAS computing infrastructure was designed many years ago based on the assumption of rather limited network connectivity between computing centres. ATLAS sites have been organized in a hierarchical model, where only a static subset of all possible network links can be exploited and a static subset of well connected sites (CERN and the T1s) can cover important functional roles such as hosting master copies of the data. The pragmatic adoption of such simplified approach, in respect of a more relaxed scenario interconnecting all sites, was very beneficial during the commissioning of the ATLAS distributed computing system and essential in reducing the operational cost during the first two years of LHC data taking. In the mean time, networks evolved far beyond this initial scenario: while a few countries are still poorly connected with the rest of the WLCG infrastructure, most of the ATLAS computing centres are now efficiently interlinked. Our operational experience in running the computing infrastructure in ...

  10. Myeloid Malignancies with Chromosome 5q Deletions Acquire a Dependency on an Intrachromosomal NF-κB Gene Network

    Directory of Open Access Journals (Sweden)

    Jing Fang

    2014-09-01

    Full Text Available Chromosome 5q deletions (del[5q] are common in high-risk (HR myelodysplastic syndrome (MDS and acute myeloid leukemia (AML; however, the gene regulatory networks that sustain these aggressive diseases are unknown. Reduced miR-146a expression in del(5q HR MDS/AML and miR-146a−/− hematopoietic stem/progenitor cells (HSPCs results in TRAF6/NF-κB activation. Increased survival and proliferation of HSPCs from miR-146alow HR MDS/AML is sustained by a neighboring haploid gene, SQSTM1 (p62, expressed from the intact 5q allele. Overexpression of p62 from the intact allele occurs through NF-κB-dependent feedforward signaling mediated by miR-146a deficiency. p62 is necessary for TRAF6-mediated NF-κB signaling, as disrupting the p62-TRAF6 signaling complex results in cell-cycle arrest and apoptosis of MDS/AML cells. Thus, del(5q HR MDS/AML employs an intrachromosomal gene network involving loss of miR-146a and haploid overexpression of p62 via NF-κB to sustain TRAF6/NF-κB signaling for cell survival and proliferation. Interfering with the p62-TRAF6 signaling complex represents a therapeutic option in miR-146a-deficient and aggressive del(5q MDS/AML.

  11. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  12. Maths-type q-deformed coherent states for q>1

    International Nuclear Information System (INIS)

    Quesne, C.; Penson, K.A.; Tkachuk, V.M.

    2003-01-01

    Maths-type q-deformed coherent states with q>1 allow a resolution of unity in the form of an ordinary integral. They are sub-Poissonian and squeezed. They may be associated with a harmonic oscillator with minimal uncertainties in both position and momentum and are intelligent coherent states for the corresponding deformed Heisenberg algebra

  13. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  14. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  15. Q4 2017/Q1 2018 Solar Industry Update

    Energy Technology Data Exchange (ETDEWEB)

    Feldman, David J [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Margolis, Robert M [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hoskins, Jack [U.S. Department of Energy

    2018-05-16

    This technical presentation provides an update on the major trends that occurred in the solar industry in Q4 2017 and Q1 2018. Major topics of focus include global and U.S. supply and demand, module and system price, investment trends and business models, and updates on U.S. government programs supporting the solar industry.

  16. Computer networks ISE a systems approach

    CERN Document Server

    Peterson, Larry L

    2007-01-01

    Computer Networks, 4E is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and p

  17. Computer Networking Laboratory for Undergraduate Computer Technology Program

    National Research Council Canada - National Science Library

    Naghedolfeizi, Masoud

    2000-01-01

    ...) To improve the quality of education in the existing courses related to computer networks and data communications as well as other computer science courses such programming languages and computer...

  18. Integrated Optoelectronic Networks for Application-Driven Multicore Computing

    Science.gov (United States)

    2017-05-08

    AFRL-AFOSR-VA-TR-2017-0102 Integrated Optoelectronic Networks for Application- Driven Multicore Computing Sudeep Pasricha COLORADO STATE UNIVERSITY...AND SUBTITLE Integrated Optoelectronic Networks for Application-Driven Multicore Computing 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA9550-13-1-0110 5c...and supportive materials with innovative architectural designs that integrate these components according to system-wide application needs. 15

  19. 26 CFR 1.809-10 - Computation of equity base.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Computation of equity base. 1.809-10 Section 1... (CONTINUED) INCOME TAXES Gain and Loss from Operations § 1.809-10 Computation of equity base. (a) In general. For purposes of section 809, the equity base of a life insurance company includes the amount of any...

  20. Nuclear Physics computer networking: Report of the Nuclear Physics Panel on Computer Networking

    International Nuclear Information System (INIS)

    Bemis, C.; Erskine, J.; Franey, M.; Greiner, D.; Hoehn, M.; Kaletka, M.; LeVine, M.; Roberson, R.; Welch, L.

    1990-05-01

    This paper discusses: the state of computer networking within nuclear physics program; network requirements for nuclear physics; management structure; and issues of special interest to the nuclear physics program office

  1. Distinctive phenotype in 9 patients with deletion of chromosome 1q24-q25.

    Science.gov (United States)

    Burkardt, Deepika D'Cunha; Rosenfeld, Jill A; Helgeson, Maria L; Angle, Brad; Banks, Valerie; Smith, Wendy E; Gripp, Karen W; Moline, Jessica; Moran, Rocio T; Niyazov, Dmitriy M; Stevens, Cathy A; Zackai, Elaine; Lebel, Robert Roger; Ashley, Douglas G; Kramer, Nancy; Lachman, Ralph S; Graham, John M

    2011-06-01

    Reports of individuals with deletions of 1q24→q25 share common features of prenatal onset growth deficiency, microcephaly, small hands and feet, dysmorphic face and severe cognitive deficits. We report nine individuals with 1q24q25 deletions, who show distinctive features of a clinically recognizable 1q24q25 microdeletion syndrome: prenatal-onset microcephaly and proportionate growth deficiency, severe cognitive disability, small hands and feet with distinctive brachydactyly, single transverse palmar flexion creases, fifth finger clinodactyly and distinctive facial features: upper eyelid fullness, small ears, short nose with bulbous nasal tip, tented upper lip, and micrognathia. Radiographs demonstrate disharmonic osseous maturation with markedly delayed bone age. Occasional features include cleft lip and/or palate, cryptorchidism, brain and spinal cord defects, and seizures. Using oligonucleotide-based array comparative genomic hybridization, we defined the critical deletion region as 1.9 Mb at 1q24.3q25.1 (chr1: 170,135,865-172,099,327, hg18 coordinates), containing 13 genes and including CENPL, which encodes centromeric protein L, a protein essential for proper kinetochore function and mitotic progression. The growth deficiency in this syndrome is similar to what is seen in other types of primordial short stature with microcephaly, such as Majewski osteodysplastic primordial dwarfism, type II (MOPD2) and Seckel syndrome, which result from loss-of-function mutations in genes coding for centrosomal proteins. DNM3 is also in the deleted region and expressed in the brain, where it participates in the Shank-Homer complex and increases synaptic strength. Therefore, DNM3 is a candidate for the cognitive disability, and CENPL is a candidate for growth deficiency in this 1q24q25 microdeletion syndrome. Copyright © 2011 Wiley-Liss, Inc.

  2. Computer Network Security- The Challenges of Securing a Computer Network

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  3. Fast computation with spikes in a recurrent neural network

    International Nuclear Information System (INIS)

    Jin, Dezhe Z.; Seung, H. Sebastian

    2002-01-01

    Neural networks with recurrent connections are sometimes regarded as too slow at computation to serve as models of the brain. Here we analytically study a counterexample, a network consisting of N integrate-and-fire neurons with self excitation, all-to-all inhibition, instantaneous synaptic coupling, and constant external driving inputs. When the inhibition and/or excitation are large enough, the network performs a winner-take-all computation for all possible external inputs and initial states of the network. The computation is done very quickly: As soon as the winner spikes once, the computation is completed since no other neurons will spike. For some initial states, the winner is the first neuron to spike, and the computation is done at the first spike of the network. In general, there are M potential winners, corresponding to the top M external inputs. When the external inputs are close in magnitude, M tends to be larger. If M>1, the selection of the actual winner is strongly influenced by the initial states. If a special relation between the excitation and inhibition is satisfied, the network always selects the neuron with the maximum external input as the winner

  4. International Symposium on Computing and Network Sustainability

    CERN Document Server

    Akashe, Shyam

    2017-01-01

    The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

  5. Computer Networks as a New Data Base.

    Science.gov (United States)

    Beals, Diane E.

    1992-01-01

    Discusses the use of communication on computer networks as a data source for psychological, social, and linguistic research. Differences between computer-mediated communication and face-to-face communication are described, the Beginning Teacher Computer Network is discussed, and examples of network conversations are appended. (28 references) (LRW)

  6. Current density profile inside q=1 on Tore Supra

    International Nuclear Information System (INIS)

    Joffrin, E.; Desgranges, C.; Sabot, R.; Dubois, M.A.

    1995-01-01

    The Tore Supra polarimeter used to measure the poloidal field distribution is described. The current density profiles are computed in two different ways using the interferometric and polarimetric data in conjunction with the magnetic data and the location of the inversion radius determined by the soft X-ray camera. The current density inside the q=1 surface is investigated for normal and monster sawteeth. Its variation are also measured by the polarimeter and compared with that predicted by the current diffusion equation assuming complete reconnection. Finally, the safety factor profile is compared with that obtained with the striation data of the pellet ablation. The results of the evolution of the q profile during sawteeth are in good agreement with those obtained in other devices. (author) 9 refs.; 4 figs

  7. Computer networking a top-down approach

    CERN Document Server

    Kurose, James

    2017-01-01

    Unique among computer networking texts, the Seventh Edition of the popular Computer Networking: A Top Down Approach builds on the author’s long tradition of teaching this complex subject through a layered approach in a “top-down manner.” The text works its way from the application layer down toward the physical layer, motivating readers by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for readers interested in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. The Seventh Edition has been updated to reflect the most important and exciting recent advances in networking.

  8. HeNCE: A Heterogeneous Network Computing Environment

    Directory of Open Access Journals (Sweden)

    Adam Beguelin

    1994-01-01

    Full Text Available Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM. The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.

  9. Interaction of HmC1q with leech microglial cells: involvement of C1qBP-related molecule in the induction of cell chemotaxis

    Directory of Open Access Journals (Sweden)

    Tahtouh Muriel

    2012-02-01

    Full Text Available Abstract Background In invertebrates, the medicinal leech is considered to be an interesting and appropriate model to study neuroimmune mechanisms. Indeed, this non-vertebrate animal can restore normal function of its central nervous system (CNS after injury. Microglia accumulation at the damage site has been shown to be required for axon sprouting and for efficient regeneration. We characterized HmC1q as a novel chemotactic factor for leech microglial cell recruitment. In mammals, a C1q-binding protein (C1qBP alias gC1qR, which interacts with the globular head of C1q, has been reported to participate in C1q-mediated chemotaxis of blood immune cells. In this study, we evaluated the chemotactic activities of a recombinant form of HmC1q and its interaction with a newly characterized leech C1qBP that acts as its potential ligand. Methods Recombinant HmC1q (rHmC1q was produced in the yeast Pichia pastoris. Chemotaxis assays were performed to investigate rHmC1q-dependent microglia migration. The involvement of a C1qBP-related molecule in this chemotaxis mechanism was assessed by flow cytometry and with affinity purification experiments. The cellular localization of C1qBP mRNA and protein in leech was investigated using immunohistochemistry and in situ hybridization techniques. Results rHmC1q-stimulated microglia migrate in a dose-dependent manner. This rHmC1q-induced chemotaxis was reduced when cells were preincubated with either anti-HmC1q or anti-human C1qBP antibodies. A C1qBP-related molecule was characterized in leech microglia. Conclusions A previous study showed that recruitment of microglia is observed after HmC1q release at the cut end of axons. Here, we demonstrate that rHmC1q-dependent chemotaxis might be driven via a HmC1q-binding protein located on the microglial cell surface. Taken together, these results highlight the importance of the interaction between C1q and C1qBP in microglial activation leading to nerve repair in the medicinal

  10. Interaction of HmC1q with leech microglial cells: involvement of C1qBP-related molecule in the induction of cell chemotaxis.

    Science.gov (United States)

    Tahtouh, Muriel; Garçon-Bocquet, Annelise; Croq, Françoise; Vizioli, Jacopo; Sautière, Pierre-Eric; Van Camp, Christelle; Salzet, Michel; Nagnan-le Meillour, Patricia; Pestel, Joël; Lefebvre, Christophe

    2012-02-22

    In invertebrates, the medicinal leech is considered to be an interesting and appropriate model to study neuroimmune mechanisms. Indeed, this non-vertebrate animal can restore normal function of its central nervous system (CNS) after injury. Microglia accumulation at the damage site has been shown to be required for axon sprouting and for efficient regeneration. We characterized HmC1q as a novel chemotactic factor for leech microglial cell recruitment. In mammals, a C1q-binding protein (C1qBP alias gC1qR), which interacts with the globular head of C1q, has been reported to participate in C1q-mediated chemotaxis of blood immune cells. In this study, we evaluated the chemotactic activities of a recombinant form of HmC1q and its interaction with a newly characterized leech C1qBP that acts as its potential ligand. Recombinant HmC1q (rHmC1q) was produced in the yeast Pichia pastoris. Chemotaxis assays were performed to investigate rHmC1q-dependent microglia migration. The involvement of a C1qBP-related molecule in this chemotaxis mechanism was assessed by flow cytometry and with affinity purification experiments. The cellular localization of C1qBP mRNA and protein in leech was investigated using immunohistochemistry and in situ hybridization techniques. rHmC1q-stimulated microglia migrate in a dose-dependent manner. This rHmC1q-induced chemotaxis was reduced when cells were preincubated with either anti-HmC1q or anti-human C1qBP antibodies. A C1qBP-related molecule was characterized in leech microglia. A previous study showed that recruitment of microglia is observed after HmC1q release at the cut end of axons. Here, we demonstrate that rHmC1q-dependent chemotaxis might be driven via a HmC1q-binding protein located on the microglial cell surface. Taken together, these results highlight the importance of the interaction between C1q and C1qBP in microglial activation leading to nerve repair in the medicinal leech.

  11. Degradation of AF1Q by chaperone-mediated autophagy

    International Nuclear Information System (INIS)

    Li, Peng; Ji, Min; Lu, Fei; Zhang, Jingru; Li, Huanjie; Cui, Taixing; Li Wang, Xing; Tang, Dongqi; Ji, Chunyan

    2014-01-01

    AF1Q, a mixed lineage leukemia gene fusion partner, is identified as a poor prognostic biomarker for pediatric acute myeloid leukemia (AML), adult AML with normal cytogenetic and adult myelodysplastic syndrome. AF1Q is highly regulated during hematopoietic progenitor differentiation and development but its regulatory mechanism has not been defined clearly. In the present study, we used pharmacological and genetic approaches to influence chaperone-mediated autophagy (CMA) and explored the degradation mechanism of AF1Q. Pharmacological inhibitors of lysosomal degradation, such as chloroquine, increased AF1Q levels, whereas activators of CMA, including 6-aminonicotinamide and nutrient starvation, decreased AF1Q levels. AF1Q interacts with HSPA8 and LAMP-2A, which are core components of the CMA machinery. Knockdown of HSPA8 or LAMP-2A increased AF1Q protein levels, whereas overexpression showed the opposite effect. Using an amino acid deletion AF1Q mutation plasmid, we identified that AF1Q had a KFERQ-like motif which was recognized by HSPA8 for CMA-dependent proteolysis. In conclusion, we demonstrate for the first time that AF1Q can be degraded in lysosomes by CMA. - Highlights: • Chaperone-mediated autophagy (CMA) is involved in the degradation of AF1Q. • Macroautophagy does not contribute to the AF1Q degradation. • AF1Q has a KFERQ-like motif that is recognized by CMA core components

  12. Degradation of AF1Q by chaperone-mediated autophagy

    Energy Technology Data Exchange (ETDEWEB)

    Li, Peng; Ji, Min; Lu, Fei; Zhang, Jingru [Department of Hematology, Key Laboratory of Cardiovascular Remodeling and Function Research, Qilu Hospital, Shandong University, Jinan 250012 (China); Li, Huanjie; Cui, Taixing; Li Wang, Xing [Research Center for Cell Therapy, Key Laboratory of Cardiovascular Remodeling and Function Research, Qilu Hospital, Shandong University, Jinan 250012 (China); Tang, Dongqi, E-mail: tangdq@sdu.edu.cn [Research Center for Cell Therapy, Key Laboratory of Cardiovascular Remodeling and Function Research, Qilu Hospital, Shandong University, Jinan 250012 (China); Center for Stem Cell and Regenerative Medicine, The Second Hospital of Shandong University, Jinan 250033 (China); Ji, Chunyan, E-mail: jichunyan@sdu.edu.cn [Department of Hematology, Key Laboratory of Cardiovascular Remodeling and Function Research, Qilu Hospital, Shandong University, Jinan 250012 (China)

    2014-09-10

    AF1Q, a mixed lineage leukemia gene fusion partner, is identified as a poor prognostic biomarker for pediatric acute myeloid leukemia (AML), adult AML with normal cytogenetic and adult myelodysplastic syndrome. AF1Q is highly regulated during hematopoietic progenitor differentiation and development but its regulatory mechanism has not been defined clearly. In the present study, we used pharmacological and genetic approaches to influence chaperone-mediated autophagy (CMA) and explored the degradation mechanism of AF1Q. Pharmacological inhibitors of lysosomal degradation, such as chloroquine, increased AF1Q levels, whereas activators of CMA, including 6-aminonicotinamide and nutrient starvation, decreased AF1Q levels. AF1Q interacts with HSPA8 and LAMP-2A, which are core components of the CMA machinery. Knockdown of HSPA8 or LAMP-2A increased AF1Q protein levels, whereas overexpression showed the opposite effect. Using an amino acid deletion AF1Q mutation plasmid, we identified that AF1Q had a KFERQ-like motif which was recognized by HSPA8 for CMA-dependent proteolysis. In conclusion, we demonstrate for the first time that AF1Q can be degraded in lysosomes by CMA. - Highlights: • Chaperone-mediated autophagy (CMA) is involved in the degradation of AF1Q. • Macroautophagy does not contribute to the AF1Q degradation. • AF1Q has a KFERQ-like motif that is recognized by CMA core components.

  13. The HLA-B*39 allele increases type 1 diabetes risk conferred by HLA-DRB1*04:04-DQB1*03:02 and HLA-DRB1*08-DQB1*04 class II haplotypes.

    Science.gov (United States)

    Mikk, M-L; Kiviniemi, M; Laine, A-P; Härkönen, T; Veijola, R; Simell, O; Knip, M; Ilonen, J

    2014-01-01

    To further characterise the effect of the HLA-B*39 allele on type 1 diabetes risk we assessed its role in different HLA-DR/DQ haplotypes and genotypes using 1764 nuclear families with a diabetic child collected in the framework of the Finnish Paediatric Diabetes Register. HLA assays were based on sequence specific hybridization using lanthanide labelled oligonucleotide probes. Transmissions of major HLA-DR/DQ haplotypes with and without the HLA-B*39 allele to diabetic index cases were analysed by direct haplotype and allele counting. The HLA-B*39 allele significantly increased the disease risk conferred by DRB1*04:04-DQA1*03-DQB1*03:02 and (DR8)-DQB1*04 haplotypes. The same effect was observed on genotype level as disease association for the HLA-B*39 allele was observed in multiple genotypes containing DRB1*04:04-DQA1*03-DQB1*03:02 or (DR8)-DQB1*04 haplotypes. Finally we considered the two common subtypes of the HLA-B*39 allele, B*39:01 and B*39:06 and observed their unequal distribution when stratified for specific DR-DQ haplotypes. The risk for type 1 diabetes conferred by certain DR/DQ haplotypes is modified by the presence of the HLA-B*39 and this confirms the independent disease predisposing effect of the HLA-B*39 allele. The results can be applied in enhancing the sensitivity and specificity of DR/DQ based screening programs for subjects at disease risk. Copyright © 2013 American Society for Histocompatibility and Immunogenetics. Published by Elsevier Inc. All rights reserved.

  14. Characteristics of the TRISTAN control computer network

    International Nuclear Information System (INIS)

    Kurokawa, Shinichi; Akiyama, Atsuyoshi; Katoh, Tadahiko; Kikutani, Eiji; Koiso, Haruyo; Oide, Katsunobu; Shinomoto, Manabu; Kurihara, Michio; Abe, Kenichi

    1986-01-01

    Twenty-four minicomputers forming an N-to-N token-ring network control the TRISTAN accelerator complex. The computers are linked by optical fiber cables with 10 Mbps transmission speed. The software system is based on NODAL, a multicomputer interpretive language developed at the CERN SPS. The high-level services offered to the users of the network are remote execution by the EXEC, EXEC-P and IMEX commands of NODAL and uniform file access throughout the system. The network software was designed to achieve the fast response of the EXEC command. The performance of the network is also reported. Tasks that overload the minicomputers are processed on the KEK central computers. One minicomputer in the network serves as a gateway to KEKNET, which connects the minicomputer network and the central computers. The communication with the central computers is managed within the framework of the KEK NODAL system. NODAL programs communicate with the central computers calling NODAL functions; functions for exchanging data between a data set on the central computers and a NODAL variable, submitting a batch job to the central computers, checking the status of the submitted job, etc. are prepared. (orig.)

  15. Electronic structure of bismuth in high-temperature superconductor Bi1.6Pb0.4Sr2Ca2.5Cu3.5Oσ

    International Nuclear Information System (INIS)

    Band, I.M.; Egorovm, A.I.; Karazhanova, G.I.

    1990-01-01

    The shifts of K α1 X-ray of bismuth in the HTS-ceramic Bi 1.6 Pb 0.4 Sr 2 Ca 2.5 Cu 5 O σ and Bi 2 O 3 are measured experimentally. It is shown that bismuth is threevalent in the HTS-ceramic. From comparison of the experimental values of shifts with theoretical values calculated within the framework of different modifications of Hartree-Fock method the effective charge at the bismuth atoms in these compounds is determined: q(Bi 2 O 3 )=1.5+2.0, q(Bi 1.6 Pb 0.4 Sr 2 Ca 2.5 Cu 3.5 O σ )= 1.6+2.1. It was suggested, That the Bi significant covalence degree in HTS-ceramic may be a cause of noticeable contribution of the Bi 6p-states in the density of states at Fermi-level. 13 refs.; 1 fig.; 2 tabs

  16. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  17. Production and characterization of a murine monoclonal IgM antibody to human C1q receptor (C1qR)

    International Nuclear Information System (INIS)

    Ghebrehiwet, B.

    1986-01-01

    A hybridoma cell line that produces a monoclonal antibody (MAb) to cell surface C1q receptor (C1qr) has been produced by fusion of the P3 x 63-Ag8.653 mouse myeloma cell line with the spleen cells of a CD-1 mouse that had been hyperimmunized with viable Raji cell suspensions (5 x 10 7 cells/inoculum). This MAb, designated II1/D1, is an IgM antibody with lambda-light chain specificity. Radiolabeled or unlabeled, highly purified II1/D1 was used to determine that: a) this antibody competes for C1q binding sites on C1qR-bearing cells; b) the molecule recognized by this MAb is the C1qR; and c) cells that are known to bind C1q also bind II1/D1 in a specific manner. Western blot analysis of solubilized Raji, or U937 cell membranes, showed that the 125 I-MAb detected a major protein band of approximately 85000 m.w. in its unreduced state, indicating that the C1qR is similar, if not identical, in both types of cells. Analyses of 125 I-II/D1 binding experiments revealed that the antibody bound to Raji cells or u937 cells in a specific manner. Uptake of the antibody was saturable, with equilibrium virtually attained within 35 min. Scatchard analysis of the binding data using the intact MAb suggests that the affinity constant K/sub D/ is 2.9 x 10 -10 M, and at apparent saturation, 24.6 ng of the antibody were bound per 2 x 10 6 cells, giving an estimated 7.8 x 10 3 antibody molecules bound per cell. That the II1/D1 antibody is specifically directed to the C1q was further evidenced by an ELISA in which the ability of C1qR-bearing cells to bind the MAb was abrogated by c-C1q in a specific dose-dependent manner

  18. Constructing Precisely Computing Networks with Biophysical Spiking Neurons.

    Science.gov (United States)

    Schwemmer, Michael A; Fairhall, Adrienne L; Denéve, Sophie; Shea-Brown, Eric T

    2015-07-15

    While spike timing has been shown to carry detailed stimulus information at the sensory periphery, its possible role in network computation is less clear. Most models of computation by neural networks are based on population firing rates. In equivalent spiking implementations, firing is assumed to be random such that averaging across populations of neurons recovers the rate-based approach. Recently, however, Denéve and colleagues have suggested that the spiking behavior of neurons may be fundamental to how neuronal networks compute, with precise spike timing determined by each neuron's contribution to producing the desired output (Boerlin and Denéve, 2011; Boerlin et al., 2013). By postulating that each neuron fires to reduce the error in the network's output, it was demonstrated that linear computations can be performed by networks of integrate-and-fire neurons that communicate through instantaneous synapses. This left open, however, the possibility that realistic networks, with conductance-based neurons with subthreshold nonlinearity and the slower timescales of biophysical synapses, may not fit into this framework. Here, we show how the spike-based approach can be extended to biophysically plausible networks. We then show that our network reproduces a number of key features of cortical networks including irregular and Poisson-like spike times and a tight balance between excitation and inhibition. Lastly, we discuss how the behavior of our model scales with network size or with the number of neurons "recorded" from a larger computing network. These results significantly increase the biological plausibility of the spike-based approach to network computation. We derive a network of neurons with standard spike-generating currents and synapses with realistic timescales that computes based upon the principle that the precise timing of each spike is important for the computation. We then show that our network reproduces a number of key features of cortical networks

  19. Offline computing and networking

    International Nuclear Information System (INIS)

    Appel, J.A.; Avery, P.; Chartrand, G.

    1985-01-01

    This note summarizes the work of the Offline Computing and Networking Group. The report is divided into two sections; the first deals with the computing and networking requirements and the second with the proposed way to satisfy those requirements. In considering the requirements, we have considered two types of computing problems. The first is CPU-intensive activity such as production data analysis (reducing raw data to DST), production Monte Carlo, or engineering calculations. The second is physicist-intensive computing such as program development, hardware design, physics analysis, and detector studies. For both types of computing, we examine a variety of issues. These included a set of quantitative questions: how much CPU power (for turn-around and for through-put), how much memory, mass-storage, bandwidth, and so on. There are also very important qualitative issues: what features must be provided by the operating system, what tools are needed for program design, code management, database management, and for graphics

  20. 26 CFR 1.167(b)-0 - Methods of computing depreciation.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Methods of computing depreciation. 1.167(b)-0....167(b)-0 Methods of computing depreciation. (a) In general. Any reasonable and consistently applied method of computing depreciation may be used or continued in use under section 167. Regardless of the...

  1. Syntenic homology of human unique DNA sequences within chromossome regions 5q31, 10q22, 13q32-33 and 19q13.1 in the great apes

    Directory of Open Access Journals (Sweden)

    Rhea U. Vallente-Samonte

    2000-09-01

    Full Text Available Homologies between chromosome banding patterns and DNA sequences in the great apes and humans suggest an apparent common origin for these two lineages. The availability of DNA probes for specific regions of human chromosomes (5q31, 10q22, 13q32-33 and 19q13.1 led us to cross-hybridize these to chimpanzee (Pan troglodytes, PTR, gorilla (Gorilla gorilla, GGO and orangutan (Pongo pygmaeus, PPY chromosomes in a search for equivalent regions in the great apes. Positive hybridization signals to the chromosome 5q31-specific DNA probe were observed at HSA 5q31, PTR 4q31, GGO 4q31 and PPY 4q31, while fluorescent signals using the chromosome 10q22-specific DNA probe were noted at HSA 10q22, PTR 8q22, GGO 8q22 and PPY 7q22. The chromosome arms showing hybridization signals to the Quint-EssentialTM 13-specific DNA probe were identified as HSA 13q32-33, PTR 14q32-33, GGO 14q32-33 and PPY 14q32-33, while those presenting hybridization signals to the chromosome 19q13.1-specific DNA probe were identified as HSA 19q13.1, PTR 20q13, GGO 20q13 and PPY 20q13. All four probes presumably hybridized to homologous chromosomal locations in the apes, which suggests a homology of certain unique DNA sequences among hominoid species.Homologias entre os padrões de bandamento de cromossomos e seqüências de DNA em grandes macacos e humanos sugerem uma aparente origem comum para estas duas linhagens. A disponibilidade de sondas de DNA para regiões específicas de cromossomos humanos (5q31, 10q22, 13q32-33 e 19q13.1 nos levou a realizar hibridação cruzada com cromossomos de chimpanzé (Pan troglodytes, PTR, gorila (Gorilla gorilla, GGO e orangotango (Pongo pygmaeus, PPY em um pesquisa de regiões equivalentes em grandes macacos. Sinais positivos de hibridação para a sonda de DNA específica para o cromossomo 5q31 foram observados em HSA 5q31, PTR 4q31, GGO 4q31 e PPY 4q31, enquanto que sinais fluorescentes usando a sonda de DNA específica para o cromossomo 10q22 foram

  2. A Distributed Computing Network for Real-Time Systems.

    Science.gov (United States)

    1980-11-03

    7 ) AU2 o NAVA TUNDEWATER SY$TEMS CENTER NEWPORT RI F/G 9/2 UIS RIBUT E 0 COMPUTIN G N LTWORK FOR REAL - TIME SYSTEMS .(U) UASSIFIED NOV Al 6 1...MORAIS - UT 92 dLEVEL c A Distributed Computing Network for Real - Time Systems . 11 𔃺-1 Gordon E/Morson I7 y tm- ,r - t "en t As J 2 -p .. - 7 I’ cNaval...NUMBER TD 5932 / N 4. TITLE mand SubotI. S. TYPE OF REPORT & PERIOD COVERED A DISTRIBUTED COMPUTING NETWORK FOR REAL - TIME SYSTEMS 6. PERFORMING ORG

  3. Fundamentals of computational intelligence neural networks, fuzzy systems, and evolutionary computation

    CERN Document Server

    Keller, James M; Fogel, David B

    2016-01-01

    This book covers the three fundamental topics that form the basis of computational intelligence: neural networks, fuzzy systems, and evolutionary computation. The text focuses on inspiration, design, theory, and practical aspects of implementing procedures to solve real-world problems. While other books in the three fields that comprise computational intelligence are written by specialists in one discipline, this book is co-written by current former Editor-in-Chief of IEEE Transactions on Neural Networks and Learning Systems, a former Editor-in-Chief of IEEE Transactions on Fuzzy Systems, and the founding Editor-in-Chief of IEEE Transactions on Evolutionary Computation. The coverage across the three topics is both uniform and consistent in style and notation. Discusses single-layer and multilayer neural networks, radial-basi function networks, and recurrent neural networks Covers fuzzy set theory, fuzzy relations, fuzzy logic interference, fuzzy clustering and classification, fuzzy measures and fuzz...

  4. Computational intelligence synergies of fuzzy logic, neural networks and evolutionary computing

    CERN Document Server

    Siddique, Nazmul

    2013-01-01

    Computational Intelligence: Synergies of Fuzzy Logic, Neural Networks and Evolutionary Computing presents an introduction to some of the cutting edge technological paradigms under the umbrella of computational intelligence. Computational intelligence schemes are investigated with the development of a suitable framework for fuzzy logic, neural networks and evolutionary computing, neuro-fuzzy systems, evolutionary-fuzzy systems and evolutionary neural systems. Applications to linear and non-linear systems are discussed with examples. Key features: Covers all the aspect

  5. Highly reliable computer network for real time system

    International Nuclear Information System (INIS)

    Mohammed, F.A.; Omar, A.A.; Ayad, N.M.A.; Madkour, M.A.I.; Ibrahim, M.K.

    1988-01-01

    Many of computer networks have been studied different trends regarding the network architecture and the various protocols that govern data transfers and guarantee a reliable communication among all a hierarchical network structure has been proposed to provide a simple and inexpensive way for the realization of a reliable real-time computer network. In such architecture all computers in the same level are connected to a common serial channel through intelligent nodes that collectively control data transfers over the serial channel. This level of computer network can be considered as a local area computer network (LACN) that can be used in nuclear power plant control system since it has geographically dispersed subsystems. network expansion would be straight the common channel for each added computer (HOST). All the nodes are designed around a microprocessor chip to provide the required intelligence. The node can be divided into two sections namely a common section that interfaces with serial data channel and a private section to interface with the host computer. This part would naturally tend to have some variations in the hardware details to match the requirements of individual host computers. fig 7

  6. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  7. Open-flavor charm and bottom s q q ¯ Q ¯ and q q q ¯ Q ¯ tetraquark states

    Science.gov (United States)

    Chen, Wei; Chen, Hua-Xing; Liu, Xiang; Steele, T. G.; Zhu, Shi-Lin

    2017-06-01

    We provide comprehensive investigations for the mass spectrum of exotic open-flavor charmed/bottom s q q ¯ c ¯ , q q q ¯ c ¯ , s q q ¯ b ¯ , q q q ¯ b ¯ tetraquark states with various spin-parity assignments JP=0+,1+,2+ and 0- , 1- in the framework of QCD sum rules. In the diquark configuration, we construct the diquark-antidiquark interpolating tetraquark currents using the color-antisymmetric scalar and axial-vector diquark fields. The stable mass sum rules are established in reasonable parameter working ranges, which are used to give reliable mass predictions for these tetraquark states. We obtain the mass spectra for the open-flavor charmed/bottom s q q ¯c ¯, q q q ¯c ¯, s q q ¯b ¯, q q q ¯b ¯ tetraquark states with various spin-parity quantum numbers. In addition, we suggest searching for exotic doubly-charged tetraquarks, such as [s d ][u ¯ c ¯ ]→Ds(*)-π- in future experiments at facilities such as BESIII, BelleII, PANDA, LHCb, and CMS, etc.

  8. Measuring microscopic evolution processes of complex networks based on empirical data

    International Nuclear Information System (INIS)

    Chi, Liping

    2015-01-01

    Aiming at understanding the microscopic mechanism of complex systems in real world, we perform the measurement that characterizes the evolution properties on two empirical data sets. In the Autonomous Systems Internet data, the network size keeps growing although the system suffers a high rate of node deletion (r = 0.4) and link deletion (q = 0.81). However, the average degree keeps almost unchanged during the whole time range. At each time step the external links attached to a new node are about c = 1.1 and the internal links added between existing nodes are approximately m = 8. For the Scientific Collaboration data, it is a cumulated result of all the authors from 1893 up to the considered year. There is no deletion of nodes and links, r = q = 0. The external and internal links at each time step are c = 1.04 and m = 0, correspondingly. The exponents of degree distribution p(k) ∼ k -γ of these two empirical datasets γ data are in good agreement with that obtained theoretically γ theory . The results indicate that these evolution quantities may provide an insight into capturing the microscopic dynamical processes that govern the network topology. (paper)

  9. Genome-wide association analysis in East Asians identifies breast cancer susceptibility loci at 1q32.1, 5q14.3 and 15q26.1

    Science.gov (United States)

    Cai, Qiuyin; Zhang, Ben; Sung, Hyuna; Low, Siew-Kee; Kweon, Sun-Seog; Lu, Wei; Shi, Jiajun; Long, Jirong; Wen, Wanqing; Choi, Ji-Yeob; Noh, Dong-Young; Shen, Chen-Yang; Matsuo, Keitaro; Teo, Soo-Hwang; Kim, Mi Kyung; Khoo, Ui Soon; Iwasaki, Motoki; Hartman, Mikael; Takahashi, Atsushi; Ashikawa, Kyota; Matsuda, Koichi; Shin, Min-Ho; Park, Min Ho; Zheng, Ying; Xiang, Yong-Bing; Ji, Bu-Tian; Park, Sue K.; Wu, Pei-Ei; Hsiung, Chia-Ni; Ito, Hidemi; Kasuga, Yoshio; Kang, Peter; Mariapun, Shivaani; Ahn, Sei Hyun; Kang, Han Sung; Chan, Kelvin Y. K.; Man, Ellen P. S.; Iwata, Hiroji; Tsugane, Shoichiro; Miao, Hui; Liao, Jiemin; Nakamura, Yusuke; Kubo, Michiaki; Delahanty, Ryan J.; Zhang, Yanfeng; Li, Bingshan; Li, Chun; Gao, Yu-Tang; Shu, Xiao-Ou; Kang, Daehee; Zheng, Wei

    2014-01-01

    In a three-stage genome-wide association study among East Asian women including 22,780 cases and 24,181 controls, we identified three novel genetic loci associated with breast cancer risk, including rs4951011 at 1q32.1 (in intron 2 of the ZC3H11A gene, P = 8.82 × 10−9), rs10474352 at 5q14.3 (near the ARRDC3 gene, P = 1.67 × 10−9), and rs2290203 at 15q26.1 (in intron 14 of the PRC1 gene, P = 4.25 × 10−8). These associations were replicated in European-ancestry populations including 16,003 cases and 41,335 controls (P = 0.030, 0.004, and 0.010, respectively). Data from the ENCODE project suggest that variants rs4951011 and rs10474352 may be located in an enhancer region and transcription factor binding sites, respectively. This study provides additional insights into the genetics and biology of breast cancer. PMID:25038754

  10. Minimum Data Set Q1a Report

    Data.gov (United States)

    U.S. Department of Health & Human Services — The MDS Q1a report summarizes, by state and county, percentages of residents that answered Yes to Q1a - Residents expresses or indicates preference to return to the...

  11. Correlation of anti C1Q antibodies with disease activity in patients with systemic lupus erythematosus

    International Nuclear Information System (INIS)

    Riaz, M.O.; Ahmed, T.A.

    2016-01-01

    significantly higher percentage of patients with evidence of complement consumption was found to be positive for anti C1q antibodies (p=0.01). This significance was only seen in patients with reduced C3 levels (p=0.04) and not reduced C4 levels (p=0.23) or both (p=0.23.Anti C1q antibody levels had significant inverse correlation with serum C3 levels. (p=0.007). Conclusion: A significant inverse correlation was found between SLEDAI scores and serum anti C1q antibody levels in patients with severe SLE. The anti C1q antibody positivity is significantly higher in patients with reduced C3 levels. (author)

  12. Evaluation of Network Reliability for Computer Networks with Multiple Sources

    Directory of Open Access Journals (Sweden)

    Yi-Kuei Lin

    2012-01-01

    Full Text Available Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN. This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs. Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu to one sink (New York that goes through a submarine and land surface cable between Taiwan and the United States.

  13. Integrated computer network high-speed parallel interface

    International Nuclear Information System (INIS)

    Frank, R.B.

    1979-03-01

    As the number and variety of computers within Los Alamos Scientific Laboratory's Central Computer Facility grows, the need for a standard, high-speed intercomputer interface has become more apparent. This report details the development of a High-Speed Parallel Interface from conceptual through implementation stages to meet current and future needs for large-scle network computing within the Integrated Computer Network. 4 figures

  14. Direct Comparison of 19F qNMR and 1H qNMR by Characterizing Atorvastatin Calcium Content

    Directory of Open Access Journals (Sweden)

    Yang Liu

    2016-01-01

    Full Text Available Quantitative nuclear magnetic resonance (qNMR is a powerful tool in measuring drug content because of its high speed, sensitivity, and precision. Most of the reports were based on proton qNMR (1H qNMR and only a few fluorine qNMR (19F qNMR were reported. No research has been conducted to directly compare the advantage and disadvantage between these two methods. In the present study, both 19F and 1H qNMR were performed to characterize the content of atorvastatin calcium with the same internal standard. Linearity, precision, and results from two methods were compared. Results showed that 19F qNMR has similar precision and sensitivity to 1H qNMR. Both methods generate similar results compared to mass balance method. Major advantage from 19F qNMR is that the analyte signal is with less or no interference from impurities. 19F qNMR is an excellent approach to quantify fluorine-containing analytes.

  15. Understanding the impact of 1q21.1 copy number variant

    Directory of Open Access Journals (Sweden)

    Harvard Chansonette

    2011-08-01

    Full Text Available Abstract Background 1q21.1 Copy Number Variant (CNV is associated with a highly variable phenotype ranging from congenital anomalies, learning deficits/intellectual disability (ID, to a normal phenotype. Hence, the clinical significance of this CNV can be difficult to evaluate. Here we described the consequences of the 1q21.1 CNV on genome-wide gene expression and function of selected candidate genes within 1q21.1 using cell lines from clinically well described subjects. Methods and Results Eight subjects from 3 families were included in the study: six with a 1q21.1 deletion and two with a 1q21.1 duplication. High resolution Affymetrix 2.7M array was used to refine the 1q21.1 CNV breakpoints and exclude the presence of secondary CNVs of pathogenic relevance. Whole genome expression profiling, studied in lymphoblast cell lines (LBCs from 5 subjects, showed enrichment of genes from 1q21.1 in the top 100 genes ranked based on correlation of expression with 1q21.1 copy number. The function of two top genes from 1q21.1, CHD1L/ALC1 and PRKAB2, was studied in detail in LBCs from a deletion and a duplication carrier. CHD1L/ALC1 is an enzyme with a role in chromatin modification and DNA damage response while PRKAB2 is a member of the AMP kinase complex, which senses and maintains systemic and cellular energy balance. The protein levels for CHD1L/ALC1 and PRKAB2 were changed in concordance with their copy number in both LBCs. A defect in chromatin remodeling was documented based on impaired decatenation (chromatid untangling checkpoint (DCC in both LBCs. This defect, reproduced by CHD1L/ALC1 siRNA, identifies a new role of CHD1L/ALC1 in DCC. Both LBCs also showed elevated levels of micronuclei following treatment with a Topoisomerase II inhibitor suggesting increased DNA breaks. AMP kinase function, specifically in the deletion containing LBCs, was attenuated. Conclusion Our studies are unique as they show for the first time that the 1q21.1 CNV not only

  16. ProjectQ: An Open Source Software Framework for Quantum Computing

    OpenAIRE

    Steiger, Damian S.; Häner, Thomas; Troyer, Matthias

    2016-01-01

    We introduce ProjectQ, an open source software effort for quantum computing. The first release features a compiler framework capable of targeting various types of hardware, a high-performance simulator with emulation capabilities, and compiler plug-ins for circuit drawing and resource estimation. We introduce our Python-embedded domain-specific language, present the features, and provide example implementations for quantum algorithms. The framework allows testing of quantum algorithms through...

  17. Understanding and designing computer networks

    CERN Document Server

    King, Graham

    1995-01-01

    Understanding and Designing Computer Networks considers the ubiquitous nature of data networks, with particular reference to internetworking and the efficient management of all aspects of networked integrated data systems. In addition it looks at the next phase of networking developments; efficiency and security are covered in the sections dealing with data compression and data encryption; and future examples of network operations, such as network parallelism, are introduced.A comprehensive case study is used throughout the text to apply and illustrate new techniques and concepts as th

  18. Using satellite communications for a mobile computer network

    Science.gov (United States)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  19. The BRCA1 c. 5096G>A p.Arg1699Gln (R1699Q) intermediate risk variant

    DEFF Research Database (Denmark)

    Moghadasi, Setareh; Meeks, Huong D.; Vreeswijk, Maaike Pg

    2018-01-01

    studied families, to further define cancer risks and to propose adjusted clinical management of female BRCA1*R1699Q carriers. METHODS: Data were collected from 129 BRCA1*R1699Q families ascertained internationally by ENIGMA (Evidence-based Network for the Interpretation of Germline Mutant Alleles......BACKGROUND: We previously showed that the BRCA1 variant c.5096G>A p.Arg1699Gln (R1699Q) was associated with an intermediate risk of breast cancer (BC) and ovarian cancer (OC). This study aimed to assess these cancer risks for R1699Q carriers in a larger cohort, including follow-up of previously......) consortium members. A modified segregation analysis was used to calculate BC and OC risks. Relative risks were calculated under both monogenic model and major gene plus polygenic model assumptions. RESULTS: In this cohort the cumulative risk of BC and OC by age 70 years was 20% and 6%, respectively...

  20. Computer network environment planning and analysis

    Science.gov (United States)

    Dalphin, John F.

    1989-01-01

    The GSFC Computer Network Environment provides a broadband RF cable between campus buildings and ethernet spines in buildings for the interlinking of Local Area Networks (LANs). This system provides terminal and computer linkage among host and user systems thereby providing E-mail services, file exchange capability, and certain distributed computing opportunities. The Environment is designed to be transparent and supports multiple protocols. Networking at Goddard has a short history and has been under coordinated control of a Network Steering Committee for slightly more than two years; network growth has been rapid with more than 1500 nodes currently addressed and greater expansion expected. A new RF cable system with a different topology is being installed during summer 1989; consideration of a fiber optics system for the future will begin soon. Summmer study was directed toward Network Steering Committee operation and planning plus consideration of Center Network Environment analysis and modeling. Biweekly Steering Committee meetings were attended to learn the background of the network and the concerns of those managing it. Suggestions for historical data gathering have been made to support future planning and modeling. Data Systems Dynamic Simulator, a simulation package developed at NASA and maintained at GSFC was studied as a possible modeling tool for the network environment. A modeling concept based on a hierarchical model was hypothesized for further development. Such a model would allow input of newly updated parameters and would provide an estimation of the behavior of the network.

  1. Computer network for electric power control systems. Chubu denryoku (kabu) denryoku keito seigyoyo computer network

    Energy Technology Data Exchange (ETDEWEB)

    Tsuneizumi, T. (Chubu Electric Power Co. Inc., Nagoya (Japan)); Shimomura, S.; Miyamura, N. (Fuji Electric Co. Ltd., Tokyo (Japan))

    1992-06-03

    A computer network for electric power control system was developed that is applied with the open systems interconnection (OSI), an international standard for communications protocol. In structuring the OSI network, a direct session layer was accessed from the operation functions when high-speed small-capacity information is transmitted. File transfer, access and control having a function of collectively transferring large-capacity data were applied when low-speed large-capacity information is transmitted. A verification test for the realtime computer network (RCN) mounting regulation was conducted according to a verification model using a mini-computer, and a result that can satisfy practical performance was obtained. For application interface, kernel, health check and two-route transmission functions were provided as a connection control function, so were transmission verification function and late arrival abolishing function. In system mounting pattern, dualized communication server (CS) structure was adopted. A hardware structure may include a system to have the CS function contained in a host computer and a separate installation system. 5 figs., 6 tabs.

  2. Detailed structure of the q profile around q=1 in JET

    International Nuclear Information System (INIS)

    Pegourie, B.; Dubois, M.A.; Gill, R.D.

    1989-01-01

    The limitation of ablation on rational surfaces has been shown to be an efficient mechanism of striation formation during pellet ablation. In JET, a very large striation is observed when the pellet crosses the q=1 surface. This paper presents a thorough analysis of the pellet ablation in this region and shows that an extended shearless zone around q=1 is necessary to reproduce the experimental signal. Such a feature is likely to be an essential ingredient in the understanding of internal disruptions. (author) 4 refs., 2 figs

  3. Computer Networks A Systems Approach

    CERN Document Server

    Peterson, Larry L

    2011-01-01

    This best-selling and classic book teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, the authors explain various protocols and networking technologies. Their systems-oriented approach encourages you to think about how individual network components fit into a larger, complex system of interactions. Whatever your perspective, whether it be that of an application developer, network administrator, or a designer of network equipment or protocols, you will come away with a "big pictur

  4. Computational network design from functional specifications

    KAUST Repository

    Peng, Chi Han; Yang, Yong Liang; Bao, Fan; Fink, Daniel; Yan, Dongming; Wonka, Peter; Mitra, Niloy J.

    2016-01-01

    of people in a workspace. Designing such networks from scratch is challenging as even local network changes can have large global effects. We investigate how to computationally create networks starting from only high-level functional specifications

  5. Convolutional networks for fast, energy-efficient neuromorphic computing.

    Science.gov (United States)

    Esser, Steven K; Merolla, Paul A; Arthur, John V; Cassidy, Andrew S; Appuswamy, Rathinakumar; Andreopoulos, Alexander; Berg, David J; McKinstry, Jeffrey L; Melano, Timothy; Barch, Davis R; di Nolfo, Carmelo; Datta, Pallab; Amir, Arnon; Taba, Brian; Flickner, Myron D; Modha, Dharmendra S

    2016-10-11

    Deep networks are now able to achieve human-level performance on a broad spectrum of recognition tasks. Independently, neuromorphic computing has now demonstrated unprecedented energy-efficiency through a new chip architecture based on spiking neurons, low precision synapses, and a scalable communication network. Here, we demonstrate that neuromorphic computing, despite its novel architectural primitives, can implement deep convolution networks that (i) approach state-of-the-art classification accuracy across eight standard datasets encompassing vision and speech, (ii) perform inference while preserving the hardware's underlying energy-efficiency and high throughput, running on the aforementioned datasets at between 1,200 and 2,600 frames/s and using between 25 and 275 mW (effectively >6,000 frames/s per Watt), and (iii) can be specified and trained using backpropagation with the same ease-of-use as contemporary deep learning. This approach allows the algorithmic power of deep learning to be merged with the efficiency of neuromorphic processors, bringing the promise of embedded, intelligent, brain-inspired computing one step closer.

  6. Self-Awareness in Computer Networks

    Directory of Open Access Journals (Sweden)

    Ariane Keller

    2014-01-01

    Full Text Available The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.

  7. Autonomic computing enabled cooperative networked design

    CERN Document Server

    Wodczak, Michal

    2014-01-01

    This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inc

  8. Computer network time synchronization the network time protocol

    CERN Document Server

    Mills, David L

    2006-01-01

    What started with the sundial has, thus far, been refined to a level of precision based on atomic resonance: Time. Our obsession with time is evident in this continued scaling down to nanosecond resolution and beyond. But this obsession is not without warrant. Precision and time synchronization are critical in many applications, such as air traffic control and stock trading, and pose complex and important challenges in modern information networks.Penned by David L. Mills, the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol

  9. Trisomy 2q11.2-->q21.1 resulting from an unbalanced insertion in two generations.

    Science.gov (United States)

    Glass, I A; Stormer, P; Oei, P T; Hacking, E; Cotter, P D

    1998-01-01

    In this communication, we describe two cases of proximal 2q trisomy (2q11.2--> q21.1) resulting from an interchromosomal insertion. The chromosomal origin of the insertion was confirmed by fluorescence in situ hybridisation. An unbalanced karyotype, 46,XX,der(8) ,ins(8;2) (p21.3; q21.1q11.2), was found in the proband and her mother, who both have mild mental retardation, short stature, dysmorphic features, insulin dependent diabetes mellitus, and a psychotic illness. This family is a rare example of direct transmission of a partial autosomal trisomy. Images PMID:9598728

  10. 26 CFR 1.806-4 - Change of basis in computing reserves.

    Science.gov (United States)

    2010-04-01

    .... For the taxable year 1959, S elects to revalue such reserves on a net level premium basis under... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Change of basis in computing reserves. 1.806-4... TAX (CONTINUED) INCOME TAXES Investment Income § 1.806-4 Change of basis in computing reserves. (a) In...

  11. Computing and Network - Overview

    International Nuclear Information System (INIS)

    Jakubowski, Z.

    1999-01-01

    Full text: The responsibility of the Network Group covers: - providing central services like WWW, DNS (Domain Name Server), mail, etc.; - maintenance and support of the Local Area Networks,; - operation of the Wide Area Networks (LAN); - the support of the central UNIX servers and desktop workstations; - VAX/VMS cluster operation and support. The two-processor HP-UNIX K-200 and 6-processor SGI Challenge XL servers were delivering stable services to our users. Both servers were upgraded during the past year. SGI Challenge received additional 256 MB of memory. It was necessary in order to get all benefits of true 64-bit architecture of the SGI IRIX 6.2. The upgrade of our HP K-200 server were problematic so we decided to buy a new powerful machine and join the old and new machine via the fast network. Besides these main servers we have more than 30 workstations from IBM, DEC, HP, SGI and SUN. We observed a real race in PC technology in the past year. Intel processors deliver currently a performance that is comparable with HP or SUN workstations at very low costs. These CPU power is especially visible under Linux that is free Unix-like operating system. The clusters of cheap PC computers should be seriously considered in planning the computing power for the future experiments. The CPU power was further decentralized-smaller but powerful computers cover growing computing demands of our work-groups creating a small ''local computing centers''. The stable network and the concept of central services plays the essential role in this scenario. Unfortunately the network performance for the international communications is persistently unacceptable. We believe that attempts to join the European Quantum project is the only way to achieve the reasonable international network performance. In these plan polish scientific community will gain 34 Mbps international link. The growing costs of the ''real meetings'' give us no alternative to ''virtual meetings'' via the network in the

  12. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  13. Mobile Agents in Networking and Distributed Computing

    CERN Document Server

    Cao, Jiannong

    2012-01-01

    The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.

  14. Representations of the q-deformed algebras Uq (so2,1) and Uq (so3,1)

    International Nuclear Information System (INIS)

    Gavrilik, O.M.; Klimyk, A.U.

    1993-01-01

    Representations of algebra U q (so 2 ,1) are studied. This algebra is a q-deformation of the universal enveloping algebra U(so 2 ,1) of the Lie algebra of the group SO 0 (2,1) and differs from the quantum algebra U q (SU 1 ,1). Classifications of irreducible representations and of infinitesimally irreducible representations of U q (SU 1 ,1). The sets of irreducible representations and of infinitesimally unitary irreducible representations of the algebra U q (so 3 ,1) are given. We also consider representations of U q (so n ,1) which are of class 1 with respect to subalgebra U q (so n ). (author). 22 refs

  15. Biophysical constraints on the computational capacity of biochemical signaling networks

    Science.gov (United States)

    Wang, Ching-Hao; Mehta, Pankaj

    Biophysics fundamentally constrains the computations that cells can carry out. Here, we derive fundamental bounds on the computational capacity of biochemical signaling networks that utilize post-translational modifications (e.g. phosphorylation). To do so, we combine ideas from the statistical physics of disordered systems and the observation by Tony Pawson and others that the biochemistry underlying protein-protein interaction networks is combinatorial and modular. Our results indicate that the computational capacity of signaling networks is severely limited by the energetics of binding and the need to achieve specificity. We relate our results to one of the theoretical pillars of statistical learning theory, Cover's theorem, which places bounds on the computational capacity of perceptrons. PM and CHW were supported by a Simons Investigator in the Mathematical Modeling of Living Systems Grant, and NIH Grant No. 1R35GM119461 (both to PM).

  16. 2013 International Conference on Computer Engineering and Network

    CERN Document Server

    Zhu, Tingshao

    2014-01-01

    This book aims to examine innovation in the fields of computer engineering and networking. The book covers important emerging topics in computer engineering and networking, and it will help researchers and engineers improve their knowledge of state-of-art in related areas. The book presents papers from The Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) which was held on July 20-21, in Shanghai, China.

  17. Hyperswitch Network For Hypercube Computer

    Science.gov (United States)

    Chow, Edward; Madan, Herbert; Peterson, John

    1989-01-01

    Data-driven dynamic switching enables high speed data transfer. Proposed hyperswitch network based on mixed static and dynamic topologies. Routing header modified in response to congestion or faults encountered as path established. Static topology meets requirement if nodes have switching elements that perform necessary routing header revisions dynamically. Hypercube topology now being implemented with switching element in each computer node aimed at designing very-richly-interconnected multicomputer system. Interconnection network connects great number of small computer nodes, using fixed hypercube topology, characterized by point-to-point links between nodes.

  18. Interdependent networks - Topological percolation research and application in finance

    Science.gov (United States)

    Zhou, Di

    This dissertation covers the two major parts of my Ph.D. research: i) developing a theoretical framework of complex networks and applying simulation and numerical methods to study the robustness of the network system, and ii) applying statistical physics concepts and methods to quantitatively analyze complex systems and applying the theoretical framework to study real-world systems. In part I, we focus on developing theories of interdependent networks as well as building computer simulation models, which includes three parts: 1) We report on the effects of topology on failure propagation for a model system consisting of two interdependent networks. We find that the internal node correlations in each of the networks significantly changes the critical density of failures, which can trigger the total disruption of the two-network system. Specifically, we find that the assortativity within a single network decreases the robustness of the entire system. 2) We study the percolation behavior of two interdependent scale-free (SF) networks under random failure of 1-p fraction of nodes. We find that as the coupling strength q between the two networks reduces from 1 (fully coupled) to 0 (no coupling), there exist two critical coupling strengths q1 and q2 , which separate the behaviors of the giant component as a function of p into three different regions, and for q2 relationship both analytically and numerically. We study a starlike network of n Erdos-Renyi (ER), SF networks and a looplike network of n ER networks, and we find for starlike networks, their phase transition regions change with n, but for looplike networks the phase regions change with average degree k . In part II, we apply concepts and methods developed in statistical physics to study economic systems. We analyze stock market indices and foreign exchange daily returns for 60 countries over the period of 1999-2012. We build a multi-layer network model based on different correlation measures, and introduce a

  19. 4th International Conference on Computer Engineering and Networks

    CERN Document Server

    2015-01-01

    This book aims to examine innovation in the fields of computer engineering and networking. The book covers important emerging topics in computer engineering and networking, and it will help researchers and engineers improve their knowledge of state-of-art in related areas. The book presents papers from the 4th International Conference on Computer Engineering and Networks (CENet2014) held July 19-20, 2014 in Shanghai, China.  ·       Covers emerging topics for computer engineering and networking ·       Discusses how to improve productivity by using the latest advanced technologies ·       Examines innovation in the fields of computer engineering and networking  

  20. Computing with Spiking Neuron Networks

    NARCIS (Netherlands)

    H. Paugam-Moisy; S.M. Bohte (Sander); G. Rozenberg; T.H.W. Baeck (Thomas); J.N. Kok (Joost)

    2012-01-01

    htmlabstractAbstract Spiking Neuron Networks (SNNs) are often referred to as the 3rd gener- ation of neural networks. Highly inspired from natural computing in the brain and recent advances in neurosciences, they derive their strength and interest from an ac- curate modeling of synaptic interactions

  1. 26 CFR 7.999-1 - Computation of the international boycott factor.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 14 2010-04-01 2010-04-01 false Computation of the international boycott factor...-1 Computation of the international boycott factor. (a) In general. Sections 908(a), 952(a)(3), and... 993(a)(3)) that includes that person participates in or cooperates with an international boycott...

  2. Convolutional networks for fast, energy-efficient neuromorphic computing

    Science.gov (United States)

    Esser, Steven K.; Merolla, Paul A.; Arthur, John V.; Cassidy, Andrew S.; Appuswamy, Rathinakumar; Andreopoulos, Alexander; Berg, David J.; McKinstry, Jeffrey L.; Melano, Timothy; Barch, Davis R.; di Nolfo, Carmelo; Datta, Pallab; Amir, Arnon; Taba, Brian; Flickner, Myron D.; Modha, Dharmendra S.

    2016-01-01

    Deep networks are now able to achieve human-level performance on a broad spectrum of recognition tasks. Independently, neuromorphic computing has now demonstrated unprecedented energy-efficiency through a new chip architecture based on spiking neurons, low precision synapses, and a scalable communication network. Here, we demonstrate that neuromorphic computing, despite its novel architectural primitives, can implement deep convolution networks that (i) approach state-of-the-art classification accuracy across eight standard datasets encompassing vision and speech, (ii) perform inference while preserving the hardware’s underlying energy-efficiency and high throughput, running on the aforementioned datasets at between 1,200 and 2,600 frames/s and using between 25 and 275 mW (effectively >6,000 frames/s per Watt), and (iii) can be specified and trained using backpropagation with the same ease-of-use as contemporary deep learning. This approach allows the algorithmic power of deep learning to be merged with the efficiency of neuromorphic processors, bringing the promise of embedded, intelligent, brain-inspired computing one step closer. PMID:27651489

  3. Patients Carrying 9q31.1-q32 Deletion Share Common Features with Cornelia de Lange Syndrome

    Directory of Open Access Journals (Sweden)

    Ruixue Cao

    2015-01-01

    Full Text Available Background: Cornelia de Lange Syndrome (CdLS is a rare but severe clinically heterogeneous developmental disorder characterized by facial dysmorphia, growth and cognitive retardation, and abnormalities of limb development. Objectives: To determine the pathogenesis of a patient with CdLS. Methods: We studied a patient with CdLS by whole exome sequencing, karyotyping and Agilent CGH Array. The results were confirmed by quantitative real-time PCR analysis of the patient and her parents. Further comparison of our patient and cases with partially overlapping deletions retrieved from the literature and databases was undertaken. Results: Whole exome sequencing had excluded the mutation of cohesion genes such as NIPBL,SMC1A and SMC3. The result of karyotyping showed a deletion of chromosome 9q31.1-q32 and the result of Agilent CGH Array further displayed a 12.01-Mb region of deletion at chromosome bands 9q31.1-q32. Reported cases with the deletion of 9q31.1-q32 share similar features with our CdLS patient. One of the genes in the deleted region, SMC2, belongs to the Structural Maintenance of Chromosomes (SMC family and regulates gene expression and DNA repair. Conclusions: Patients carrying the deletion of 9q31.1-q32 showed similar phenotypes with CdLS.

  4. NCBI nr-aa BLAST: CBRC-PTRO-04-0004 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-PTRO-04-0004 sp|Q8VBS7|VN1A6_MOUSE Vomeronasal type-1 receptor A6 (Vomeronasal... type-1 receptor A3) (Vomeronasal type-1 receptor A1) (Vomeronasal type-1 receptor A10) dbj|BAB79209.1| vomeronasa...l receptor 1 A1 [Mus musculus] dbj|BAB79210.1| vomeronasal receptor 1 A3 [Mus musculus] gb|AAK98772.1| vomeronasa

  5. High Performance Networks From Supercomputing to Cloud Computing

    CERN Document Server

    Abts, Dennis

    2011-01-01

    Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material simulations and molecular dynamics to such Internet applications as Web search, language translation, collaborative Internet applications, streaming video and voice-over-IP. For both Supercomputing and Cloud Computing the network enables distributed applicati

  6. Computing chemical organizations in biological networks.

    Science.gov (United States)

    Centler, Florian; Kaleta, Christoph; di Fenizio, Pietro Speroni; Dittrich, Peter

    2008-07-15

    Novel techniques are required to analyze computational models of intracellular processes as they increase steadily in size and complexity. The theory of chemical organizations has recently been introduced as such a technique that links the topology of biochemical reaction network models to their dynamical repertoire. The network is decomposed into algebraically closed and self-maintaining subnetworks called organizations. They form a hierarchy representing all feasible system states including all steady states. We present three algorithms to compute the hierarchy of organizations for network models provided in SBML format. Two of them compute the complete organization hierarchy, while the third one uses heuristics to obtain a subset of all organizations for large models. While the constructive approach computes the hierarchy starting from the smallest organization in a bottom-up fashion, the flux-based approach employs self-maintaining flux distributions to determine organizations. A runtime comparison on 16 different network models of natural systems showed that none of the two exhaustive algorithms is superior in all cases. Studying a 'genome-scale' network model with 762 species and 1193 reactions, we demonstrate how the organization hierarchy helps to uncover the model structure and allows to evaluate the model's quality, for example by detecting components and subsystems of the model whose maintenance is not explained by the model. All data and a Java implementation that plugs into the Systems Biology Workbench is available from http://www.minet.uni-jena.de/csb/prj/ot/tools.

  7. Development of the computer network of IFIN-HH

    International Nuclear Information System (INIS)

    Danet, A.; Mirica, M.; Constantinescu, S.

    1998-01-01

    The general computer network of Horia Hulubei National Institute for Physics and Nuclear Engineering (IFIN-HH), as part of RNC (Romanian National Computer Network for scientific research and technological development), offers the Romanian physics research community an efficient and cost-effective infrastructure to communicate and collaborate with fellow researchers abroad, and to collect and exchange the most up-to-date information in their research area. RNC is the national project co-ordinated and established by the Ministry of Research and Technology targeted on the following main objectives: - setting up a technical and organizational infrastructure meant to provide national and international electronic services for the Romanian scientific research community; - providing a rapid and competitive tool for the exchange information in the framework of R-D community; - using the scientific and technical data bases available in the country and offered by the national networks from other countries through international networks; - providing a support for information, documentation, scientific and technical co-operation. The guiding principle in elaborating the project of general computer network of IFIN-HH was to implement an open system based on OSI standards without technical barriers in communication between different communities using different computing hardware and software. The major objectives achieved in 1997 in the direction of developing the general computer network of IFIN-HH (over 250 computers connected) were: - connecting all the existing and newly installed computer equipment and providing an adequate connectivity; - providing the usual Internet services: e-mail, ftp, telnet, finger, gopher; - providing access to the World Wide Web resources; - providing on-line statistics of IP traffic (input and output) of each node of the domain computer network; - improving the performance of the connection with the central node RNC. (authors)

  8. NCBI nr-aa BLAST: CBRC-AGAM-04-0111 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-AGAM-04-0111 ref|NP_001029470.1| non imprinted in Prader-Willi/Angelman syndro...me 2 [Bos taurus] sp|Q3SWX0|NIPA2_BOVIN Non-imprinted in Prader-Willi/Angelman syndrome region protein 2 hom...olog gb|AAI04628.1| Non imprinted in Prader-Willi/Angelman syndrome 2 [Bos taurus] NP_001029470.1 2e-72 51% ...

  9. Establishing Interaction between Machine and Medaka using Deep Q-Network

    Directory of Open Access Journals (Sweden)

    Ryo Nishimura

    2016-05-01

    Full Text Available Social interaction is the basic ability for animals to survive. It is difficult for a machine to interact with human or other animals because it is not clear how the machine should interact. This paper examines whether an artificial dot controlled by a machine can interact with a medaka and induce a desired behavior. The dot is displayed on a monitor. We use deep Q network (DQN to learn how to move the dot. As a result, the DQN could learn some basic elements to interact with the medaka and the desired behavior could be induced.

  10. Direct interaction between CD91 and C1q

    DEFF Research Database (Denmark)

    Duus, Karen; Hansen, Erik W; Tacnet, Pascale

    2010-01-01

    . C1q binding to monocytes was shown to be correlated with CD91 expression and could be inhibited by the CD91 chaperone, receptor-associated protein. We also report data showing a direct interaction between CD91 and C1q. The interaction was investigated using various protein interaction assays....... A direct interaction between purified C1q and CD91 was observed both by ELISA and a surface plasmon resonance assay, with either C1q or CD91 immobilized. The interaction showed characteristics of specificity because it was time-dependent, saturable and could be inhibited by known ligands of both CD91 and C...

  11. Computational chaos in massively parallel neural networks

    Science.gov (United States)

    Barhen, Jacob; Gulati, Sandeep

    1989-01-01

    A fundamental issue which directly impacts the scalability of current theoretical neural network models to massively parallel embodiments, in both software as well as hardware, is the inherent and unavoidable concurrent asynchronicity of emerging fine-grained computational ensembles and the possible emergence of chaotic manifestations. Previous analyses attributed dynamical instability to the topology of the interconnection matrix, to parasitic components or to propagation delays. However, researchers have observed the existence of emergent computational chaos in a concurrently asynchronous framework, independent of the network topology. Researcher present a methodology enabling the effective asynchronous operation of large-scale neural networks. Necessary and sufficient conditions guaranteeing concurrent asynchronous convergence are established in terms of contracting operators. Lyapunov exponents are computed formally to characterize the underlying nonlinear dynamics. Simulation results are presented to illustrate network convergence to the correct results, even in the presence of large delays.

  12. Optical interconnection networks for high-performance computing systems

    International Nuclear Information System (INIS)

    Biberman, Aleksandr; Bergman, Keren

    2012-01-01

    Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers. (review article)

  13. Proceedings of workshop on distributed computing and network

    International Nuclear Information System (INIS)

    Abe, F.; Yuasa, F.

    1993-02-01

    'Distributed Computing and Network' is one of hot topics in the field of computing. Recent progress in the computer technology is providing new paradigm for computing even in High Energy Physics. Particularly the workstation based computer system is opening new active field of computer application to sciences. The major topics discussed in this symposium are distributed computing and wide area research network for domestic and international link. The two days symposium provided so enough topics to foresee the next direction of our computing environment. 70 people have got together to discuss on these interesting thema as well as information exchange on the computer technologies. (J.P.N.)

  14. Computing all hybridization networks for multiple binary phylogenetic input trees.

    Science.gov (United States)

    Albrecht, Benjamin

    2015-07-30

    The computation of phylogenetic trees on the same set of species that are based on different orthologous genes can lead to incongruent trees. One possible explanation for this behavior are interspecific hybridization events recombining genes of different species. An important approach to analyze such events is the computation of hybridization networks. This work presents the first algorithm computing the hybridization number as well as a set of representative hybridization networks for multiple binary phylogenetic input trees on the same set of taxa. To improve its practical runtime, we show how this algorithm can be parallelized. Moreover, we demonstrate the efficiency of the software Hybroscale, containing an implementation of our algorithm, by comparing it to PIRNv2.0, which is so far the best available software computing the exact hybridization number for multiple binary phylogenetic trees on the same set of taxa. The algorithm is part of the software Hybroscale, which was developed specifically for the investigation of hybridization networks including their computation and visualization. Hybroscale is freely available(1) and runs on all three major operating systems. Our simulation study indicates that our approach is on average 100 times faster than PIRNv2.0. Moreover, we show how Hybroscale improves the interpretation of the reported hybridization networks by adding certain features to its graphical representation.

  15. Main: 1M2Q [RPSD[Archive

    Lifescience Database Archive (English)

    Full Text Available 1M2Q トウモロコシ Corn Zea mays L. Casein Kinase Ii, Alpha Chain Name=Ack2; Zea Mays Mole...cule: Casein Kinase Ii, Alpha Chain; Chain: A; Fragment: Catlytic Subunit; Synonym: Ckii; Engineered: Yes Tr...ansferase 2.7.1.37 (Casein Kinase Ii, Alpha Chain) E.De Moliner, S.Sarno, S.Moro, G.Zagotto, G.Zanotti, L.A....=2-326.|PDB; 1M2Q; X-ray; A=2-328.|PDB; 1M2R; X-ray; A=2-328.|PDB; 1OM1; X-ray; A=1-332.|Mai

  16. Second International Conference on Advanced Computing, Networking and Informatics

    CERN Document Server

    Mohapatra, Durga; Konar, Amit; Chakraborty, Aruna

    2014-01-01

    Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two-volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 148 scholarly papers, which have been accepted for presentation from over 640 submissions in the second International Conference on Advanced Computing, Networking and Informatics, 2014, held in Kolkata, India during June 24-26, 2014. The first volume includes innovative computing techniques and relevant research results in informatics with selective applications in pattern recognition, signal/image process...

  17. 31 CFR 30.1 - Q-1: What definitions apply in this part?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Q-1: What definitions apply in this part? 30.1 Section 30.1 Money and Finance: Treasury Office of the Secretary of the Treasury TARP STANDARDS FOR COMPENSATION AND CORPORATE GOVERNANCE § 30.1 Q-1: What definitions apply in this part...

  18. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  19. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  20. Genetics Home Reference: 1q21.1 microduplication

    Science.gov (United States)

    ... a particular combination of heart defects known as tetralogy of Fallot . Less commonly, other physical malformations such as the ... times more common in people with schizophrenia or tetralogy of Fallot. Many people with 1q21.1 microduplications are likely ...

  1. NCBI nr-aa BLAST: CBRC-RNOR-04-0246 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0246 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-125 75% ...

  2. NCBI nr-aa BLAST: CBRC-RNOR-04-0249 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0249 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-134 76% ...

  3. NCBI nr-aa BLAST: CBRC-RNOR-04-0238 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0238 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-133 80% ...

  4. NCBI nr-aa BLAST: CBRC-RNOR-04-0255 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0255 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-120 74% ...

  5. NCBI nr-aa BLAST: CBRC-RNOR-04-0243 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0243 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-132 76% ...

  6. NCBI nr-aa BLAST: CBRC-RNOR-04-0244 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0244 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-175 100% ...

  7. NCBI nr-aa BLAST: CBRC-RNOR-04-0259 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0259 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-126 74% ...

  8. NCBI nr-aa BLAST: CBRC-RNOR-04-0240 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0240 ref|NP_775419.2| vomeronasal 1 receptor, B9 [Rattus norvegicus] s...p|Q5J3M9|VN1B9_RAT Vomeronasal type-1 receptor B9 (Vomeronasal type-1 receptor B12) (Vomeronasal receptor 5)... (Pheromone receptor VN5) gb|AAR87948.1| vomeronasal V1r-type receptor V1rb12 [Rattus norvegicus] NP_775419.2 1e-132 76% ...

  9. Computer network for experimental research using ISDN

    International Nuclear Information System (INIS)

    Ida, Katsumi; Nakanishi, Hideya

    1997-01-01

    This report describes the development of a computer network that uses the Integrated Service Digital Network (ISDN) for real-time analysis of experimental plasma physics and nuclear fusion research. Communication speed, 64/128kbps (INS64) or 1.5Mbps (INS1500) per connection, is independent of how busy the network is. When INS-1500 is used, the communication speed, which is proportional to the public telephone connection fee, can be dynamically varied from 64kbps to 1472kbps (depending on how much data are being transferred using the Bandwidth-on-Demand (BOD) function in the ISDN Router. On-demand dial-up and time-out disconnection reduce the public telephone connection fee by 10%-97%. (author)

  10. Performance of the TRISTAN computer control network

    International Nuclear Information System (INIS)

    Koiso, H.; Abe, K.; Akiyama, A.; Katoh, T.; Kikutani, E.; Kurihara, N.; Kurokawa, S.; Oide, K.; Shinomoto, M.

    1985-01-01

    An N-to-N token ring network of twenty-four minicomputers controls the TRISTAN accelerator complex. The computers are linked by optical fiber cables with 10 Mbps transmission speed. The software system is based on the NODAL, a multi-computer interpreter language developed at CERN SPS. Typical messages exchanged between computers are NODAL programs and NODAL variables transmitted by the EXEC and the REMIT commands. These messages are exchanged as a cluster of packets whose maximum size is 512 bytes. At present, eleven minicomputers are connected to the network and the total length of the ring is 1.5 km. In this condition, the maximum attainable throughput is 980 kbytes/s. The response of a pair of an EXEC and a REMIT transactions which transmit a NODAL array A and one line of program 'REMIT A' and immediately remit the A is measured to be 95+0.039/chi/ ms, where /chi/ is the array size in byte. In ordinary accelerator operations, the maximum channel utilization is 2%, the average packet length is 96 bytes and the transmission rate is 10 kbytes/s

  11. Introduction of helical computed tomography affects patient selection for V/Q lung scan

    International Nuclear Information System (INIS)

    Zettinig, G.; Baudrexel, S.; Leitha, Th.

    2002-01-01

    Aim: Retrospective analysis for determination of the effect of helical computed tomography (HCT) on utilization of V/Q lung scanning to diagnose pulmonary embolism (PE) in a large general hospital. Methods: A total number of 2676 V/Q scans of in- and out-patients referred to our department between March 1992 and December 1998 and between April 1997 and December 1998 were analyzed by an identical group of nuclear physicians. Results: Neither the total number of annually performed V/Q scans (446 ± 135) nor the mean age of patients (56 years ± 17) changed significantly since the introduction of HCT. However, the referral pattern was different. The percentage of patients with high and intermediate probability for PE decreased significantly from 15.2% to 9.4% (p <0.01) and from 10.2% to 7.3% (p <0.05), respectively. Low probability scans significantly increased from 37.8% to 42.7% (p <0.05). The percentage of normal scans did not change significantly, however, there was a highly significant increase summarizing patients with normal and low probability scans (74.6% to 83.3%; p <0.01). Conclusion: The introduction of HCT affected the selection of patients referred for V/Q lung scanning since V/Q scanning was primarily used to exclude rather to confirm PE. (orig.)

  12. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  13. Anti-C1q antibodies in systemic lupus erythematosus

    DEFF Research Database (Denmark)

    Orbai, A-M; Truedsson, L; Sturfelt, G

    2015-01-01

    OBJECTIVE: Anti-C1q has been associated with systemic lupus erythematosus (SLE) and lupus nephritis in previous studies. We studied anti-C1q specificity for SLE (vs rheumatic disease controls) and the association with SLE manifestations in an international multicenter study. METHODS: Information...... in combination with anti-dsDNA and low complement was the strongest serological association with renal involvement. These data support the usefulness of anti-C1q in SLE, especially in lupus nephritis....

  14. Pragmatically Framed Cross-Situational Noun Learning Using Computational Reinforcement Models.

    Science.gov (United States)

    Najnin, Shamima; Banerjee, Bonny

    2018-01-01

    Cross-situational learning and social pragmatic theories are prominent mechanisms for learning word meanings (i.e., word-object pairs). In this paper, the role of reinforcement is investigated for early word-learning by an artificial agent. When exposed to a group of speakers, the agent comes to understand an initial set of vocabulary items belonging to the language used by the group. Both cross-situational learning and social pragmatic theory are taken into account. As social cues, joint attention and prosodic cues in caregiver's speech are considered. During agent-caregiver interaction, the agent selects a word from the caregiver's utterance and learns the relations between that word and the objects in its visual environment. The "novel words to novel objects" language-specific constraint is assumed for computing rewards. The models are learned by maximizing the expected reward using reinforcement learning algorithms [i.e., table-based algorithms: Q-learning, SARSA, SARSA-λ, and neural network-based algorithms: Q-learning for neural network (Q-NN), neural-fitted Q-network (NFQ), and deep Q-network (DQN)]. Neural network-based reinforcement learning models are chosen over table-based models for better generalization and quicker convergence. Simulations are carried out using mother-infant interaction CHILDES dataset for learning word-object pairings. Reinforcement is modeled in two cross-situational learning cases: (1) with joint attention (Attentional models), and (2) with joint attention and prosodic cues (Attentional-prosodic models). Attentional-prosodic models manifest superior performance to Attentional ones for the task of word-learning. The Attentional-prosodic DQN outperforms existing word-learning models for the same task.

  15. Dispersals of the Siberian Y-chromosome haplogroup Q in Eurasia.

    Science.gov (United States)

    Huang, Yun-Zhi; Pamjav, Horolma; Flegontov, Pavel; Stenzl, Vlastimil; Wen, Shao-Qing; Tong, Xin-Zhu; Wang, Chuan-Chao; Wang, Ling-Xiang; Wei, Lan-Hai; Gao, Jing-Yi; Jin, Li; Li, Hui

    2018-02-01

    The human Y-chromosome has proven to be a powerful tool for tracing the paternal history of human populations and genealogical ancestors. The human Y-chromosome haplogroup Q is the most frequent haplogroup in the Americas. Previous studies have traced the origin of haplogroup Q to the region around Central Asia and Southern Siberia. Although the diversity of haplogroup Q in the Americas has been studied in detail, investigations on the diffusion of haplogroup Q in Eurasia and Africa are still limited. In this study, we collected 39 samples from China and Russia, investigated 432 samples from previous studies of haplogroup Q, and analyzed the single nucleotide polymorphism (SNP) subclades Q1a1a1-M120, Q1a2a1-L54, Q1a1b-M25, Q1a2-M346, Q1a2a1a2-L804, Q1a2b2-F1161, Q1b1a-M378, and Q1b1a1-L245. Through NETWORK and BATWING analyses, we found that the subclades of haplogroup Q continued to disperse from Central Asia and Southern Siberia during the past 10,000 years. Apart from its migration through the Beringia to the Americas, haplogroup Q also moved from Asia to the south and to the west during the Neolithic period, and subsequently to the whole of Eurasia and part of Africa.

  16. Research Activity in Computational Physics utilizing High Performance Computing: Co-authorship Network Analysis

    Science.gov (United States)

    Ahn, Sul-Ah; Jung, Youngim

    2016-10-01

    The research activities of the computational physicists utilizing high performance computing are analyzed by bibliometirc approaches. This study aims at providing the computational physicists utilizing high-performance computing and policy planners with useful bibliometric results for an assessment of research activities. In order to achieve this purpose, we carried out a co-authorship network analysis of journal articles to assess the research activities of researchers for high-performance computational physics as a case study. For this study, we used journal articles of the Scopus database from Elsevier covering the time period of 2004-2013. We extracted the author rank in the physics field utilizing high-performance computing by the number of papers published during ten years from 2004. Finally, we drew the co-authorship network for 45 top-authors and their coauthors, and described some features of the co-authorship network in relation to the author rank. Suggestions for further studies are discussed.

  17. Chemistry and Molecular Dynamics Simulations of Heme b-HemQ and Coproheme-HemQ.

    Science.gov (United States)

    Hofbauer, Stefan; Dalla Sega, Marco; Scheiblbrandner, Stefan; Jandova, Zuzana; Schaffner, Irene; Mlynek, Georg; Djinović-Carugo, Kristina; Battistuzzi, Gianantonio; Furtmüller, Paul G; Oostenbrink, Chris; Obinger, Christian

    2016-09-27

    Recently, a novel pathway for heme b biosynthesis in Gram-positive bacteria has been proposed. The final poorly understood step is catalyzed by an enzyme called HemQ and includes two decarboxylation reactions leading from coproheme to heme b. Coproheme has been suggested to act as both substrate and redox active cofactor in this reaction. In the study presented here, we focus on HemQs from Listeria monocytogenes (LmHemQ) and Staphylococcus aureus (SaHemQ) recombinantly produced as apoproteins in Escherichia coli. We demonstrate the rapid and two-phase uptake of coproheme by both apo forms and the significant differences in thermal stability of the apo forms, coproheme-HemQ and heme b-HemQ. Reduction of ferric high-spin coproheme-HemQ to the ferrous form is shown to be enthalpically favored but entropically disfavored with standard reduction potentials of -205 ± 3 mV for LmHemQ and -207 ± 3 mV for SaHemQ versus the standard hydrogen electrode at pH 7.0. Redox thermodynamics suggests the presence of a pronounced H-bonding network and restricted solvent mobility in the heme cavity. Binding of cyanide to the sixth coproheme position is monophasic but relatively slow (∼1 × 10(4) M(-1) s(-1)). On the basis of the available structures of apo-HemQ and modeling of both loaded forms, molecular dynamics simulation allowed analysis of the interaction of coproheme and heme b with the protein as well as the role of the flexibility at the proximal heme cavity and the substrate access channel for coproheme binding and heme b release. Obtained data are discussed with respect to the proposed function of HemQ in monoderm bacteria.

  18. Computing with networks of nonlinear mechanical oscillators.

    Directory of Open Access Journals (Sweden)

    Jean C Coulombe

    Full Text Available As it is getting increasingly difficult to achieve gains in the density and power efficiency of microelectronic computing devices because of lithographic techniques reaching fundamental physical limits, new approaches are required to maximize the benefits of distributed sensors, micro-robots or smart materials. Biologically-inspired devices, such as artificial neural networks, can process information with a high level of parallelism to efficiently solve difficult problems, even when implemented using conventional microelectronic technologies. We describe a mechanical device, which operates in a manner similar to artificial neural networks, to solve efficiently two difficult benchmark problems (computing the parity of a bit stream, and classifying spoken words. The device consists in a network of masses coupled by linear springs and attached to a substrate by non-linear springs, thus forming a network of anharmonic oscillators. As the masses can directly couple to forces applied on the device, this approach combines sensing and computing functions in a single power-efficient device with compact dimensions.

  19. Familial isolated clubfoot is associated with recurrent chromosome 17q23.1q23.2 microduplications containing TBX4.

    Science.gov (United States)

    Alvarado, David M; Aferol, Hyuliya; McCall, Kevin; Huang, Jason B; Techy, Matthew; Buchan, Jillian; Cady, Janet; Gonzales, Patrick R; Dobbs, Matthew B; Gurnett, Christina A

    2010-07-09

    Clubfoot is a common musculoskeletal birth defect for which few causative genes have been identified. To identify the genes responsible for isolated clubfoot, we screened for genomic copy-number variants with the Affymetrix Genome-wide Human SNP Array 6.0. A recurrent chromosome 17q23.1q23.2 microduplication was identified in 3 of 66 probands with familial isolated clubfoot. The chromosome 17q23.1q23.2 microduplication segregated with autosomal-dominant clubfoot in all three families but with reduced penetrance. Mild short stature was common and one female had developmental hip dysplasia. Subtle skeletal abnormalities consisted of broad and shortened metatarsals and calcanei, small distal tibial epiphyses, and thickened ischia. Several skeletal features were opposite to those described in the reciprocal chromosome 17q23.1q23.2 microdeletion syndrome associated with developmental delay and cardiac and limb abnormalities. Of note, during our study, we also identified a microdeletion at the locus in a sibling pair with isolated clubfoot. The chromosome 17q23.1q23.2 region contains the T-box transcription factor TBX4, a likely target of the bicoid-related transcription factor PITX1 previously implicated in clubfoot etiology. Our result suggests that this chromosome 17q23.1q23.2 microduplication is a relatively common cause of familial isolated clubfoot and provides strong evidence linking clubfoot etiology to abnormal early limb development. Copyright 2010 The American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  20. Computer Networks and Globalization

    Directory of Open Access Journals (Sweden)

    J. Magliaro

    2007-07-01

    Full Text Available Communication and information computer networks connect the world in ways that make globalization more natural and inequity more subtle. As educators, we look at these phenomena holistically analyzing them from the realist’s view, thus exploring tensions, (in equity and (injustice, and from the idealist’s view, thus embracing connectivity, convergence and development of a collective consciousness. In an increasingly market- driven world we find examples of openness and human generosity that are based on networks, specifically the Internet. After addressing open movements in publishing, software industry and education, we describe the possibility of a dialectic equilibrium between globalization and indigenousness in view of ecologically designed future smart networks

  1. Computer networks and their implications for nuclear data

    International Nuclear Information System (INIS)

    Carlson, J.

    1992-01-01

    Computer networks represent a valuable resource for accessing information. Just as the computer has revolutionized the ability to process and analyze information, networks have and will continue to revolutionize data collection and access. A number of services are in routine use that would not be possible without the presence of an (inter)national computer network (which will be referred to as the internet). Services such as electronic mail, remote terminal access, and network file transfers are almost a required part of any large scientific/research organization. These services only represent a small fraction of the potential uses of the internet; however, the remainder of this paper discusses some of these uses and some technological developments that may influence these uses

  2. Coenzyme Q10 supplementation decreases statin-related mild-to-moderate muscle symptoms: a randomized clinical study.

    Science.gov (United States)

    Skarlovnik, Ajda; Janić, Miodrag; Lunder, Mojca; Turk, Martina; Šabovič, Mišo

    2014-11-06

    Statin use is frequently associated with muscle-related symptoms. Coenzyme Q10 supplementation has yielded conflicting results in decreasing statin myopathy. Herein, we tested whether coenzyme Q10 supplementation could decrease statin-associated muscular pain in a specific group of patients with mild-to-moderate muscle symptoms. Fifty patients treated with statins and reporting muscle pain were recruited. The Q10 group (n=25) received coenzyme Q10 supplementation over a period of 30 days (50 mg twice daily), and the control group (n=25) received placebo. The Brief Pain Inventory (BPI) questionnaire was used and blood testing was performed at inclusion in the study and after 30 days of supplementation. The intensity of muscle pain, measured as the Pain Severity Score (PSS), in the Q10 group was reduced from 3.9±0.4 to 2.9±0.4 (PPain Interference Score (PIS) after Q10 supplementation was reduced from 4.0±0.4 to 2.6±0.4 (Pstatin-related muscle symptoms in 75% of patients. The relative values of PSS and PIS significantly decreased (-33.1% and -40.3%, respectively) in the Q10 group compared to placebo group (both Pmuscle enzymes or cholesterol values were found. The present results show that coenzyme Q10 supplementation (50 mg twice daily) effectively reduced statin-related mild-to-moderate muscular symptoms, causing lower interference of statin-related muscular symptoms with daily activities.

  3. Central MHD activities and role of the q=1 rational surface for pellet fuelled JT-60 plasmas

    International Nuclear Information System (INIS)

    Kamada, Yutaka; Ozeki, Takahisa; Azumi, Masafumi; Yoshino, Ryuji; Nagami, Masayuki; Konoshima, Shigeru

    1990-08-01

    Improved energy confinement for the pellet fuelled plasmas on JT-60 is mainly due to the peaked density and pressure profiles inside the q=1 rational surface, where the confinement characteristics appear to be better than those in the outer (q>1) region. In the well-center-fuelled pellet injection discharges, the sawtooth activity can be suppressed completely during 0.41 sec or the frequency of sawtooth is reduced by up to one order of magnitude during 0.5∼1.5 sec after the pellet injection. For high high-current low-q (Ip = 2.5∼3.1 MA; q(a) < 3) discharges, reduction in the sawtooth frequency has a strong relationship with enhanced confinement and peakedness of the electron density profile. The contribution of the sawtooth activity to the global energy confinement increases systematically with decreasing q(a). At the sawtooth emerging after the pellet injection into high-Ip limiter discharges, only small amount of the central kinetic energy is released and the sawtooth does not follow the fully reconnecting style. The release of the central kinetic energy and the existence of precursor and successor m = 1 oscillations are discussed. The sawtooth crash tends to have more ideal-like characteristics for higher beta values and lower safety factors. The rotation velocity of the central plasma column after the pellet injection is also discussed with the frequencies of the m = 1 oscillations. Just after the pellet injection, the plasma column starts to rotate in the ion-diamagnetic direction or the co-direction to the plasma current. At each sawtooth, the rotation frequency changes suddenly to the ion-diamagnetic direction or the co-direction. (author) 47 refs. 44 figs

  4. Collective network for computer structures

    Science.gov (United States)

    Blumrich, Matthias A [Ridgefield, CT; Coteus, Paul W [Yorktown Heights, NY; Chen, Dong [Croton On Hudson, NY; Gara, Alan [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Hoenicke, Dirk [Ossining, NY; Takken, Todd E [Brewster, NY; Steinmacher-Burow, Burkhard D [Wernau, DE; Vranas, Pavlos M [Bedford Hills, NY

    2011-08-16

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

  5. A de novo 1q22q23.1 Interstitial Microdeletion in a Girl with Intellectual Disability and Multiple Congenital Anomalies Including Congenital Heart Defect.

    Science.gov (United States)

    Aleksiūnienė, Beata; Preiksaitiene, Egle; Morkūnienė, Aušra; Ambrozaitytė, Laima; Utkus, Algirdas

    2018-01-01

    Many studies have shown that molecular karyotyping is an effective diagnostic tool in individuals with developmental delay/intellectual disability. We report on a de novo interstitial 1q22q23.1 microdeletion, 1.6 Mb in size, detected in a patient with short stature, microcephaly, hypoplastic corpus callosum, cleft palate, minor facial anomalies, congenital heart defect, camptodactyly of the 4-5th fingers, and intellectual disability. Chromosomal microarray analysis revealed a 1.6-Mb deletion in the 1q22q23.1 region, arr[GRCh37] 1q22q23.1(155630752_157193893)×1. Real-time PCR analysis confirmed its de novo origin. The deleted region encompasses 50 protein-coding genes, including the morbid genes APOA1BP, ARHGEF2, LAMTOR2, LMNA, NTRK1, PRCC, RIT1, SEMA4A, and YY1AP1. Although the unique phenotype observed in our patient can arise from the haploinsufficiency of the dosage-sensitive LMNA gene, the dosage imbalance of other genes implicated in the rearrangement could also contribute to the phenotype. Further studies are required for the delineation of the phenotype associated with this rare chromosomal alteration and elucidation of the critical genes for manifestation of the specific clinical features. © 2018 S. Karger AG, Basel.

  6. Genetics Home Reference: 1q21.1 microdeletion

    Science.gov (United States)

    ... reciprocal 1q21.1 deletions and duplications associated with microcephaly or macrocephaly and developmental and behavioral abnormalities. Nat Genet. 2008 Dec;40(12):1466-71. doi: 10.1038/ng.279. Citation on PubMed or Free article on PubMed Central Haldeman-Englert CR, Jewett T. ...

  7. Refinement of genotype-phenotype correlation in 18 patients carrying a 1q24q25 deletion

    DEFF Research Database (Denmark)

    Chatron, Nicolas; Haddad, Véronique; Andrieux, Joris

    2015-01-01

    of different sizes (490 kb to 20.95 Mb) localized within chromosome bands 1q23.3-q31.2 (chr1:160797550-192912120, hg19). The 490 kb deletion is the smallest deletion reported to date associated with this phenotype. We delineated three regions that may contribute to the phenotype: a proximal one (chr1...

  8. Computing motion using resistive networks

    Science.gov (United States)

    Koch, Christof; Luo, Jin; Mead, Carver; Hutchinson, James

    1988-01-01

    Recent developments in the theory of early vision are described which lead from the formulation of the motion problem as an ill-posed one to its solution by minimizing certain 'cost' functions. These cost or energy functions can be mapped onto simple analog and digital resistive networks. It is shown how the optical flow can be computed by injecting currents into resistive networks and recording the resulting stationary voltage distribution at each node. These networks can be implemented in cMOS VLSI circuits and represent plausible candidates for biological vision systems.

  9. Autoantibodies against C1q in systemic lupus erythematosus are antigen-driven

    DEFF Research Database (Denmark)

    Schaller, Monica; Bigler, Cornelia; Danner, Doris

    2009-01-01

    response against C1q at the molecular level, we screened a bone marrow-derived IgGkappa/IgGlambda Fab phage display library from a SLE patient with high anti-C1q Ab titer against purified human C1q. Six Fabs that exhibited strong binding to C1q in ELISA were isolated. The anti-C1q Fabs recognized...... neoepitopes that were only exposed on bound C1q and not present on soluble C1q mapping to different regions of the collagen-like region of C1q. Analysis of the genes encoding the variable H and L chains of the IgG-derived anti-C1q Fab revealed that all the variable H and L chain regions were highly mutated......, with nucleotide and amino acid homologies to the closest germline in the range of 71-97% (average 85 +/- 4) and 72-92% (average 88 +/- 6), respectively. In addition, the variable region of the Fabs exhibited high replacement to silent ratios. The six anti-C1q Fabs were shown to be of high affinity, with a K...

  10. Quantum computation over the butterfly network

    International Nuclear Information System (INIS)

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.; Murao, Mio

    2011-01-01

    In order to investigate distributed quantum computation under restricted network resources, we introduce a quantum computation task over the butterfly network where both quantum and classical communications are limited. We consider deterministically performing a two-qubit global unitary operation on two unknown inputs given at different nodes, with outputs at two distinct nodes. By using a particular resource setting introduced by M. Hayashi [Phys. Rev. A 76, 040301(R) (2007)], which is capable of performing a swap operation by adding two maximally entangled qubits (ebits) between the two input nodes, we show that unitary operations can be performed without adding any entanglement resource, if and only if the unitary operations are locally unitary equivalent to controlled unitary operations. Our protocol is optimal in the sense that the unitary operations cannot be implemented if we relax the specifications of any of the channels. We also construct protocols for performing controlled traceless unitary operations with a 1-ebit resource and for performing global Clifford operations with a 2-ebit resource.

  11. Increased complement C1q level marks active disease in human tuberculosis.

    Directory of Open Access Journals (Sweden)

    Yi Cai

    Full Text Available BACKGROUND: Complement functions as an important host defense system and complement C5 and C7 have been implicated in immunopathology of tuberculosis. However, little is known about the role of other complement components in tuberculosis. METHODS: Complement gene expression in peripheral blood mononuclear cells of tuberculosis patients and controls were determined using whole genome transcriptional microarray assays. The mRNA and protein levels of three C1q components, C1qA, C1qB, and C1qC, were further validated by qRT-PCR and enzyme-linked immunosorbent assay, respectively. The percentages of C1q expression in CD14 positive cells were determined by flow cytometry. Finally, C1qC protein level was quantified in the pleural fluid of tuberculosis and non-tuberculosis pleurisy. RESULTS: C1q expression increases significantly in the peripheral blood of patients with active tuberculosis compared to healthy controls and individuals with latent TB infection. The percentage of C1q-expressing CD14 positive cells is significantly increased in active TB patients. C1q expression in the peripheral blood correlates with sputum smear positivity in tuberculosis patients and is reduced after anti-tuberculosis chemotherapy. Notably, receiver operating characteristic analysis showed that C1qC mRNA levels in peripheral blood efficiently discriminate active from latent tuberculosis infection and healthy controls. Additionally, C1qC protein level in pleural effusion shows improved power in discriminating tuberculosis from non-tuberculosis pleurisy when compared to other inflammatory markers, such as IL-6 and TNF-α. CONCLUSIONS: C1q expression correlates with active disease in human tuberculosis. C1q could be a potential diagnostic marker to discriminate active tuberculosis from latent tuberculosis infection as well as tuberculosis pleurisy from non-tuberculosis pleurisy.

  12. Computer systems and networks status and perspectives

    CERN Document Server

    Zacharov, V

    1981-01-01

    The properties of computers are discussed, both as separate units and in inter-coupled systems. The main elements of modern processor technology are reviewed and the associated peripheral components are discussed in the light of the prevailing rapid pace of developments. Particular emphasis is given to the impact of very large scale integrated circuitry in these developments. Computer networks are considered in some detail, including common-carrier and local-area networks, and the problem of inter-working is included in the discussion. Components of network systems and the associated technology are also among the topics treated.

  13. Computer systems and networks: Status and perspectives

    International Nuclear Information System (INIS)

    Zacharov, Z.

    1981-01-01

    The properties of computers are discussed, both as separate units and in inter-coupled systems. The main elements of modern processor thechnology are reviewed and the associated peripheral components are disscussed in the light of the prevailling rapid pace of developments. Particular emphais is given to the impact of very large scale integrated circuitry in these developments. Computer networks, and considered in some detail, including comon-carrier and local-area networks and the problem of inter-working is included in the discussion. Components of network systems and the associated technology are also among the topics treated. (orig.)

  14. Social networks a framework of computational intelligence

    CERN Document Server

    Chen, Shyi-Ming

    2014-01-01

    This volume provides the audience with an updated, in-depth and highly coherent material on the conceptually appealing and practically sound information technology of Computational Intelligence applied to the analysis, synthesis and evaluation of social networks. The volume involves studies devoted to key issues of social networks including community structure detection in networks, online social networks, knowledge growth and evaluation, and diversity of collaboration mechanisms.  The book engages a wealth of methods of Computational Intelligence along with well-known techniques of linear programming, Formal Concept Analysis, machine learning, and agent modeling.  Human-centricity is of paramount relevance and this facet manifests in many ways including personalized semantics, trust metric, and personal knowledge management; just to highlight a few of these aspects. The contributors to this volume report on various essential applications including cyber attacks detection, building enterprise social network...

  15. PARA'04 Workshop on State-of-the-art in Scientific Computing, June 20-23, 2004: Complementary Proceedings

    DEFF Research Database (Denmark)

    Dongarra, Jack; Madsen, Kaj; Wasniewski, Jerzy

    2004-01-01

    , was held in Lyngby, Denmark, June 20-23, 2004. The PARA'04 Workshop was organized by Jack Dongarra from the University of Tennessee and Oak Ridge National Laboratory, and Kaj Madsen and Jerzy Wasniewski from the Technical University of Denmark. The emphasis here was shifted to High-Performance Computing...... (HPC). The ongoing development of ever more advanced computers provides the potential for solving increasingly dif cult computational problems. However, given the complexity of modern computer architectures, the task of realizing this potential needs careful attention. For example, the failure......The PARA workshops in the past have been devoted to parallel computing methods in science and technology. There have been seven PARA meetings to date: PARA'94, PARA'95 and PARA'96 in Lyngby, Denmark, PARA'98 in Umeå, Sweden, PARA'2000 in Bergen, Norway, PARA'02 in Espoo, Finland, and PARA'04 again...

  16. 3rd International Conference on Advanced Computing, Networking and Informatics

    CERN Document Server

    Mohapatra, Durga; Chaki, Nabendu

    2016-01-01

    Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Third International Conference on Advanced Computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 23–25, 2015.

  17. Interstitial deletion of 5q33.3q35.1 in a boy with severe mental retardation

    OpenAIRE

    Lee, Jin Hwan; Kim, Hyo Jeong; Yoon, Jung Min; Cheon, Eun Jung; Lim, Jae Woo; Ko, Kyong Og; Lee, Gyung Min

    2016-01-01

    Constitutional interstitial deletions of the long arm of chromosome 5 (5q) are quite rare, and the corresponding phenotype is not yet clearly delineated. Severe mental retardation has been described in most patients who present 5q deletions. Specifically, the interstitial deletion of chromosome 5q33.3q35.1, an extremely rare chromosomal aberration, is characterized by mental retardation, developmental delay, and facial dysmorphism. Although the severity of mental retardation varies across cas...

  18. Paralelno umrežavanje računara / Parallel networking of the computers

    Directory of Open Access Journals (Sweden)

    Milojko Jevtović

    2007-04-01

    Full Text Available U radu je izložena originalna koncepcija tehničkog rešenja paralelnog umrežavanja računara, kao i lokalnih računarskih mreža (LAN - Local Area Network, odnosno povezivanje i istovremena komunikacija preko više različitih transportnih telekomunikacionih mreža. Opisano je jedno rešenje paralelnog umrežavanja, kojim je omogućen pouzdani prenos multimedijalnog saobraćaja i prenos podataka u realnom vremenu između računara ili LAN istovremeno preko N (N = 1, 2, 3, 4,.. različitih, međusobno nezavisnih mreža širokog prostranstva (WAN - Wide Area Network. Paralelno umrežavanje zasnovano je na korišćenju univerzalnog modema, čije je rešenje, takođe ukratko predstavljeno. / In this paper, new concept for parallel networking of the computers or LANs over different WAN telecommunications networks, is presented. One solution of the parallel networks, which enables reliable transfer of multimedia traffic and data transmission in real time between a computer of LAN via N (N = 1, 2 3, 4,… different inter-connected Wide Area Network. Connections between computers or LANs and wide area networks are realized using universal modems whose solution has also been presented.

  19. Integrable Equations of the Form qt=L1(x,t,q,qx,qxx)qxxx+L2(x,t,q,qx,qxx)

    International Nuclear Information System (INIS)

    Satir, Ahmet

    2003-01-01

    Integrable equations of the form q t =L 1 (x,t,q,q x ,q xx )q xxx +L 2 (x,t,q,q x ,q xx ) are considered using linearization. A new type of integrable equations which are the generalization of the integrable equations of Fokas and Ibragimov and Shabat are given

  20. Genetic interaction network of the Saccharomyces cerevisiae type 1 phosphatase Glc7

    Directory of Open Access Journals (Sweden)

    Neszt Michael

    2008-07-01

    Full Text Available Abstract Background Protein kinases and phosphatases regulate protein phosphorylation, a critical means of modulating protein function, stability and localization. The identification of functional networks for protein phosphatases has been slow due to their redundant nature and the lack of large-scale analyses. We hypothesized that a genome-scale analysis of genetic interactions using the Synthetic Genetic Array could reveal protein phosphatase functional networks. We apply this approach to the conserved type 1 protein phosphatase Glc7, which regulates numerous cellular processes in budding yeast. Results We created a novel glc7 catalytic mutant (glc7-E101Q. Phenotypic analysis indicates that this novel allele exhibits slow growth and defects in glucose metabolism but normal cell cycle progression and chromosome segregation. This suggests that glc7-E101Q is a hypomorphic glc7 mutant. Synthetic Genetic Array analysis of glc7-E101Q revealed a broad network of 245 synthetic sick/lethal interactions reflecting that many processes are required when Glc7 function is compromised such as histone modification, chromosome segregation and cytokinesis, nutrient sensing and DNA damage. In addition, mitochondrial activity and inheritance and lipid metabolism were identified as new processes involved in buffering Glc7 function. An interaction network among 95 genes genetically interacting with GLC7 was constructed by integration of genetic and physical interaction data. The obtained network has a modular architecture, and the interconnection among the modules reflects the cooperation of the processes buffering Glc7 function. Conclusion We found 245 genes required for the normal growth of the glc7-E101Q mutant. Functional grouping of these genes and analysis of their physical and genetic interaction patterns bring new information on Glc7-regulated processes.

  1. Active system area networks for data intensive computations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  2. Tactical Airborne Distributed Computing and Networks

    Science.gov (United States)

    1981-10-01

    an CnRlni-.Cj , qui ost utilis6 pour Xcuerrcpind iot q~eol CNQ on a un ’R(E~ .gui ost utilisAs pour damr-ndor la~~~~~~ ~ rernmsinLeWmot ulCP] Lea...function can result in the lailure of that tunction and cause the m.. s,.: iot , to be abandoned. For a safety critical function there is an add.iional...Controller; AP-101 interface. 30-6 ENABLE TO SRIALMANCHESTER MODULATOR CONVERTER ENCODER IDRIVER ]J .I BUS CONTROLLER - NETWORK INTERFACE Figure 5. Bus

  3. Integrating Network Management for Cloud Computing Services

    Science.gov (United States)

    2015-06-01

    Backend Distributed Datastore High-­‐level   Objec.ve   Network   Policy   Perf.   Metrics   SNAT  IP   Alloca.on   Controller...azure.microsoft.com/. 114 [16] Microsoft Azure ExpressRoute. http://azure.microsoft.com/en-us/ services/expressroute/. [17] Mobility and Networking...Networking Technologies, Services, and Protocols; Performance of Computer and Commu- nication Networks; Mobile and Wireless Communications Systems

  4. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  5. In-Network Computation is a Dumb Idea Whose Time Has Come

    KAUST Repository

    Sapio, Amedeo; Abdelaziz, Ibrahim; Aldilaijan, Abdulla; Canini, Marco; Kalnis, Panos

    2017-01-01

    Programmable data plane hardware creates new opportunities for infusing intelligence into the network. This raises a fundamental question: what kinds of computation should be delegated to the network? In this paper, we discuss the opportunities and challenges for co-designing data center distributed systems with their network layer. We believe that the time has finally come for offloading part of their computation to execute in-network. However, in-network computation tasks must be judiciously crafted to match the limitations of the network machine architecture of programmable devices. With the help of our experiments on machine learning and graph analytics workloads, we identify that aggregation functions raise opportunities to exploit the limited computation power of networking hardware to lessen network congestion and improve the overall application performance. Moreover, as a proof-of-concept, we propose DAIET, a system that performs in-network data aggregation. Experimental results with an initial prototype show a large data reduction ratio (86.9%-89.3%) and a similar decrease in the workers' computation time.

  6. In-Network Computation is a Dumb Idea Whose Time Has Come

    KAUST Repository

    Sapio, Amedeo

    2017-11-27

    Programmable data plane hardware creates new opportunities for infusing intelligence into the network. This raises a fundamental question: what kinds of computation should be delegated to the network? In this paper, we discuss the opportunities and challenges for co-designing data center distributed systems with their network layer. We believe that the time has finally come for offloading part of their computation to execute in-network. However, in-network computation tasks must be judiciously crafted to match the limitations of the network machine architecture of programmable devices. With the help of our experiments on machine learning and graph analytics workloads, we identify that aggregation functions raise opportunities to exploit the limited computation power of networking hardware to lessen network congestion and improve the overall application performance. Moreover, as a proof-of-concept, we propose DAIET, a system that performs in-network data aggregation. Experimental results with an initial prototype show a large data reduction ratio (86.9%-89.3%) and a similar decrease in the workers\\' computation time.

  7. NCBI nr-aa BLAST: CBRC-RNOR-04-0256 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0256 ref|NP_444458.1| vomeronasal 1 receptor, B7 [Mus musculus] sp|Q9EQ46|VN1B7_MOUSE Vomeronas...al type-1 receptor B7 (Vomeronasal type-1 receptor A11) gb|AAG42087.1|AF291493_1 vomeronasa...l receptor V1RB7 [Mus musculus] dbj|BAB79217.1| vomeronasal receptor 1 A11 [Mus musculus] gb|AAI41627.1| Vomeronasa...l 1 receptor, B7 [synthetic construct] gb|AAI40251.1| Vomeronasal

  8. NCBI nr-aa BLAST: CBRC-RNOR-04-0238 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0238 ref|NP_444458.1| vomeronasal 1 receptor, B7 [Mus musculus] sp|Q9EQ46|VN1B7_MOUSE Vomeronas...al type-1 receptor B7 (Vomeronasal type-1 receptor A11) gb|AAG42087.1|AF291493_1 vomeronasa...l receptor V1RB7 [Mus musculus] dbj|BAB79217.1| vomeronasal receptor 1 A11 [Mus musculus] gb|AAI41627.1| Vomeronasa...l 1 receptor, B7 [synthetic construct] gb|AAI40251.1| Vomeronasal

  9. NCBI nr-aa BLAST: CBRC-RNOR-04-0259 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0259 ref|NP_444458.1| vomeronasal 1 receptor, B7 [Mus musculus] sp|Q9EQ46|VN1B7_MOUSE Vomeronas...al type-1 receptor B7 (Vomeronasal type-1 receptor A11) gb|AAG42087.1|AF291493_1 vomeronasa...l receptor V1RB7 [Mus musculus] dbj|BAB79217.1| vomeronasal receptor 1 A11 [Mus musculus] gb|AAI41627.1| Vomeronasa...l 1 receptor, B7 [synthetic construct] gb|AAI40251.1| Vomeronasal

  10. DIMACS Workshop on Interconnection Networks and Mapping, and Scheduling Parallel Computations

    CERN Document Server

    Rosenberg, Arnold L; Sotteau, Dominique; NSF Science and Technology Center in Discrete Mathematics and Theoretical Computer Science; Interconnection networks and mapping and scheduling parallel computations

    1995-01-01

    The interconnection network is one of the most basic components of a massively parallel computer system. Such systems consist of hundreds or thousands of processors interconnected to work cooperatively on computations. One of the central problems in parallel computing is the task of mapping a collection of processes onto the processors and routing network of a parallel machine. Once this mapping is done, it is critical to schedule computations within and communication among processor from universities and laboratories, as well as practitioners involved in the design, implementation, and application of massively parallel systems. Focusing on interconnection networks of parallel architectures of today and of the near future , the book includes topics such as network topologies,network properties, message routing, network embeddings, network emulation, mappings, and efficient scheduling. inputs for a process are available where and when the process is scheduled to be computed. This book contains the refereed pro...

  11. Line-plane broadcasting in a data communications network of a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  12. Parallel Computation of Unsteady Flows on a Network of Workstations

    Science.gov (United States)

    1997-01-01

    Parallel computation of unsteady flows requires significant computational resources. The utilization of a network of workstations seems an efficient solution to the problem where large problems can be treated at a reasonable cost. This approach requires the solution of several problems: 1) the partitioning and distribution of the problem over a network of workstation, 2) efficient communication tools, 3) managing the system efficiently for a given problem. Of course, there is the question of the efficiency of any given numerical algorithm to such a computing system. NPARC code was chosen as a sample for the application. For the explicit version of the NPARC code both two- and three-dimensional problems were studied. Again both steady and unsteady problems were investigated. The issues studied as a part of the research program were: 1) how to distribute the data between the workstations, 2) how to compute and how to communicate at each node efficiently, 3) how to balance the load distribution. In the following, a summary of these activities is presented. Details of the work have been presented and published as referenced.

  13. Cloud Computing Services for Seismic Networks

    Science.gov (United States)

    Olson, Michael

    This thesis describes a compositional framework for developing situation awareness applications: applications that provide ongoing information about a user's changing environment. The thesis describes how the framework is used to develop a situation awareness application for earthquakes. The applications are implemented as Cloud computing services connected to sensors and actuators. The architecture and design of the Cloud services are described and measurements of performance metrics are provided. The thesis includes results of experiments on earthquake monitoring conducted over a year. The applications developed by the framework are (1) the CSN---the Community Seismic Network---which uses relatively low-cost sensors deployed by members of the community, and (2) SAF---the Situation Awareness Framework---which integrates data from multiple sources, including the CSN, CISN---the California Integrated Seismic Network, a network consisting of high-quality seismometers deployed carefully by professionals in the CISN organization and spread across Southern California---and prototypes of multi-sensor platforms that include carbon monoxide, methane, dust and radiation sensors.

  14. PLANETARY CANDIDATES OBSERVED BY KEPLER IV: PLANET SAMPLE FROM Q1-Q8 (22 MONTHS)

    International Nuclear Information System (INIS)

    Burke, Christopher J.; Mullally, F.; Rowe, Jason F.; Thompson, Susan E.; Coughlin, Jeffrey L.; Caldwell, Douglas A.; Jenkins, Jon M.; Bryson, Stephen T.; Haas, Michael R.; Batalha, Natalie M.; Borucki, William J.; Christiansen, Jessie L.; Ciardi, David R.; Still, Martin; Barclay, Thomas; Chaplin, William J.; Clarke, Bruce D.; Cochran, William D.; Demory, Brice-Olivier; Esquerdo, Gilbert A.

    2014-01-01

    We provide updates to the Kepler planet candidate sample based upon nearly two years of high-precision photometry (i.e., Q1-Q8). From an initial list of nearly 13,400 threshold crossing events, 480 new host stars are identified from their flux time series as consistent with hosting transiting planets. Potential transit signals are subjected to further analysis using the pixel-level data, which allows background eclipsing binaries to be identified through small image position shifts during transit. We also re-evaluate Kepler Objects of Interest (KOIs) 1-1609, which were identified early in the mission, using substantially more data to test for background false positives and to find additional multiple systems. Combining the new and previous KOI samples, we provide updated parameters for 2738 Kepler planet candidates distributed across 2017 host stars. From the combined Kepler planet candidates, 472 are new from the Q1-Q8 data examined in this study. The new Kepler planet candidates represent ∼40% of the sample with R P ∼ 1 R ⊕ and represent ∼40% of the low equilibrium temperature (T eq < 300 K) sample. We review the known biases in the current sample of Kepler planet candidates relevant to evaluating planet population statistics with the current Kepler planet candidate sample

  15. Q2 anti Q2 states with relatively narrow widths

    International Nuclear Information System (INIS)

    Ono, Seiji.

    1978-09-01

    Using the mass formulas which correctly predict the mass of mesons and baryons the mass of diquark states is computed. From this mass spectrum the existance of the observed narrow baryonia and wide baryonia can be naturally understood. Other relatively narrow Q 2 anti Q 2 states are predicted to exist. (orig.) [de

  16. Four novel Loci (19q13, 6q24, 12q24, and 5q14 influence the microcirculation in vivo.

    Directory of Open Access Journals (Sweden)

    M Kamran Ikram

    2010-10-01

    Full Text Available There is increasing evidence that the microcirculation plays an important role in the pathogenesis of cardiovascular diseases. Changes in retinal vascular caliber reflect early microvascular disease and predict incident cardiovascular events. We performed a genome-wide association study to identify genetic variants associated with retinal vascular caliber. We analyzed data from four population-based discovery cohorts with 15,358 unrelated Caucasian individuals, who are members of the Cohort for Heart and Aging Research in Genomic Epidemiology (CHARGE consortium, and replicated findings in four independent Caucasian cohorts (n  =  6,652. All participants had retinal photography and retinal arteriolar and venular caliber measured from computer software. In the discovery cohorts, 179 single nucleotide polymorphisms (SNP spread across five loci were significantly associated (p<5.0×10(-8 with retinal venular caliber, but none showed association with arteriolar caliber. Collectively, these five loci explain 1.0%-3.2% of the variation in retinal venular caliber. Four out of these five loci were confirmed in independent replication samples. In the combined analyses, the top SNPs at each locus were: rs2287921 (19q13; p  =  1.61×10(-25, within the RASIP1 locus, rs225717 (6q24; p = 1.25×10(-16, adjacent to the VTA1 and NMBR loci, rs10774625 (12q24; p  =  2.15×10(-13, in the region of ATXN2,SH2B3 and PTPN11 loci, and rs17421627 (5q14; p = 7.32×10(-16, adjacent to the MEF2C locus. In two independent samples, locus 12q24 was also associated with coronary heart disease and hypertension. Our population-based genome-wide association study demonstrates four novel loci associated with retinal venular caliber, an endophenotype of the microcirculation associated with clinical cardiovascular disease. These data provide further insights into the contribution and biological mechanisms of microcirculatory changes that underlie cardiovascular

  17. q-bosons and the q-analogue quantized field

    International Nuclear Information System (INIS)

    Nelson, C.A.

    1994-01-01

    The q-analogue coherent states |z > q are used to identify physical signatures for the presence of a q-analogue quantized radiation field in the | > q classical limit where |z| is large. In this quantum-optics-like limit, the fractional uncertainties of most physical quantities (momentum, position, amplitude, phase) which characterize the quantum field are O(1). They only vanish as O(1/|z|) when q = 1. However, for the number operator, N, and the N-Hamiltonian for a free q-boson gas, H N = ℎω(N + 1/2), the fractional uncertainties do still approach zero. A signature for q-boson counting statistics is that (ΔN) 2 / → 0 as |z| → ∞. Except for its O(1) fractional uncertainty, the q-generalization of the Hermitian phase operator of Pegg and Barnett, φ q , still exhibits normal classical behavior. The standard number-phase uncertainty-relation, ΔN Δφ q = 1/2, and the approximate commutation relation, [N,φ q ] = i, still hold for the single-mode q-analogue quantized field. So, N and φ q are almost canonically conjugate operators in the |z > q classical limit. The |z > q CS's minimize this uncertainty relation for moderate |z| 2

  18. Code 672 observational science branch computer networks

    Science.gov (United States)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  19. Cardinality enhancement utilizing Sequential Algorithm (SeQ code in OCDMA system

    Directory of Open Access Journals (Sweden)

    Fazlina C. A. S.

    2017-01-01

    Full Text Available Optical Code Division Multiple Access (OCDMA has been important with increasing demand for high capacity and speed for communication in optical networks because of OCDMA technique high efficiency that can be achieved, hence fibre bandwidth is fully used. In this paper we will focus on Sequential Algorithm (SeQ code with AND detection technique using Optisystem design tool. The result revealed SeQ code capable to eliminate Multiple Access Interference (MAI and improve Bit Error Rate (BER, Phase Induced Intensity Noise (PIIN and orthogonally between users in the system. From the results, SeQ shows good performance of BER and capable to accommodate 190 numbers of simultaneous users contrast with existing code. Thus, SeQ code have enhanced the system about 36% and 111% of FCC and DCS code. In addition, SeQ have good BER performance 10-25 at 155 Mbps in comparison with 622 Mbps, 1 Gbps and 2 Gbps bit rate. From the plot graph, 155 Mbps bit rate is suitable enough speed for FTTH and LAN networks. Resolution can be made based on the superior performance of SeQ code. Thus, these codes will give an opportunity in OCDMA system for better quality of service in an optical access network for future generation's usage

  20. Cardinality enhancement utilizing Sequential Algorithm (SeQ) code in OCDMA system

    Science.gov (United States)

    Fazlina, C. A. S.; Rashidi, C. B. M.; Rahman, A. K.; Aljunid, S. A.

    2017-11-01

    Optical Code Division Multiple Access (OCDMA) has been important with increasing demand for high capacity and speed for communication in optical networks because of OCDMA technique high efficiency that can be achieved, hence fibre bandwidth is fully used. In this paper we will focus on Sequential Algorithm (SeQ) code with AND detection technique using Optisystem design tool. The result revealed SeQ code capable to eliminate Multiple Access Interference (MAI) and improve Bit Error Rate (BER), Phase Induced Intensity Noise (PIIN) and orthogonally between users in the system. From the results, SeQ shows good performance of BER and capable to accommodate 190 numbers of simultaneous users contrast with existing code. Thus, SeQ code have enhanced the system about 36% and 111% of FCC and DCS code. In addition, SeQ have good BER performance 10-25 at 155 Mbps in comparison with 622 Mbps, 1 Gbps and 2 Gbps bit rate. From the plot graph, 155 Mbps bit rate is suitable enough speed for FTTH and LAN networks. Resolution can be made based on the superior performance of SeQ code. Thus, these codes will give an opportunity in OCDMA system for better quality of service in an optical access network for future generation's usage

  1. Network and computing infrastructure for scientific applications in Georgia

    Science.gov (United States)

    Kvatadze, R.; Modebadze, Z.

    2016-09-01

    Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.

  2. Recurrent Neural Network for Computing the Drazin Inverse.

    Science.gov (United States)

    Stanimirović, Predrag S; Zivković, Ivan S; Wei, Yimin

    2015-11-01

    This paper presents a recurrent neural network (RNN) for computing the Drazin inverse of a real matrix in real time. This recurrent neural network (RNN) is composed of n independent parts (subnetworks), where n is the order of the input matrix. These subnetworks can operate concurrently, so parallel and distributed processing can be achieved. In this way, the computational advantages over the existing sequential algorithms can be attained in real-time applications. The RNN defined in this paper is convenient for an implementation in an electronic circuit. The number of neurons in the neural network is the same as the number of elements in the output matrix, which represents the Drazin inverse. The difference between the proposed RNN and the existing ones for the Drazin inverse computation lies in their network architecture and dynamics. The conditions that ensure the stability of the defined RNN as well as its convergence toward the Drazin inverse are considered. In addition, illustrative examples and examples of application to the practical engineering problems are discussed to show the efficacy of the proposed neural network.

  3. Software network analyzer for computer network performance measurement planning over heterogeneous services in higher educational institutes

    OpenAIRE

    Ismail, Mohd Nazri

    2009-01-01

    In 21st century, convergences of technologies and services in heterogeneous environment have contributed multi-traffic. This scenario will affect computer network on learning system in higher educational Institutes. Implementation of various services can produce different types of content and quality. Higher educational institutes should have a good computer network infrastructure to support usage of various services. The ability of computer network should consist of i) higher bandwidth; ii) ...

  4. Transcriptional factor PU.1 regulates decidual C1q expression in early pregnancy in human

    Directory of Open Access Journals (Sweden)

    Priyaa Madhukaran Raj

    2015-02-01

    Full Text Available C1q is the first recognition subcomponent of the complement classical pathway, which in addition to being synthesized in the liver, is also expressed by macrophages and dendritic cells. Trophoblast invasion during early placentation results in accumulation of debris that triggers the complement system. Hence, both early and late components of the classical pathway are widely distributed in the placenta and decidua. In addition, C1q has recently been shown to significantly contribute to feto-maternal tolerance, trophoblast migration, and spiral artery remodeling, although the exact mechanism remains unknown. Pregnancy in mice, genetically deficient in C1q, mirrors symptoms similar to that of human preeclampsia. Thus, regulated complement activation has been proposed as an essential requirement for normal successful pregnancy. Little is known about the molecular pathways that regulate C1q expression in pregnancy. PU.1, an Ets-family transcription factor, is required for the development of hematopoietic myeloid lineage immune cells, and its expression is tissue- specific. Recently, PU.1 has been shown to regulate C1q gene expression in dendritic cells and macrophages. Here, we have examined if PU.1 transcription factor regulates decidual C1q expression. We used immune-histochemical analysis, PCR and immunostaining to localize and study the gene expression of PU.1 transcription factor in early human decidua. PU.1 was highly expressed at gene and protein level in early human decidual cells including trophoblast and stromal cells. Surprisingly, nuclear as well as cytoplasmic PU.1 expression was observed. Decidual cells with predominantly nuclear PU.1 expression had higher C1q expression. It is likely that nuclear and cytoplasmic PU.1 localization has a role to play in early pregnancy via regulating C1q expression in the decidua during implantation.

  5. q-Power function over q-commuting variables and deformed XXX, XXZ chains

    International Nuclear Information System (INIS)

    Khoroshkin, S.M.; Stolin, A.A.; Tolstoy, V.N.

    2001-01-01

    Certain functional identifies for the Gauss q-power function of a sum of q-commuting variables are found. Then these identifies are used to obtain two-parameter twists of the quantum affine algebra U q (sl 2 ) and of the Yangian Y(sl 2 ). The corresponding deformed trigonometric and rational quantum R matrices, which then are used in the computation of deformed XXX and XXZ Hamiltonians [ru

  6. Computational network design from functional specifications

    KAUST Repository

    Peng, Chi Han

    2016-07-11

    Connectivity and layout of underlying networks largely determine agent behavior and usage in many environments. For example, transportation networks determine the flow of traffic in a neighborhood, whereas building floorplans determine the flow of people in a workspace. Designing such networks from scratch is challenging as even local network changes can have large global effects. We investigate how to computationally create networks starting from only high-level functional specifications. Such specifications can be in the form of network density, travel time versus network length, traffic type, destination location, etc. We propose an integer programming-based approach that guarantees that the resultant networks are valid by fulfilling all the specified hard constraints and that they score favorably in terms of the objective function. We evaluate our algorithm in two different design settings, street layout and floorplans to demonstrate that diverse networks can emerge purely from high-level functional specifications.

  7. Human diploid fibroblasts have receptors for the globular domain of C1Q

    International Nuclear Information System (INIS)

    Bordin, S.; Page, R.C.

    1986-01-01

    The authors showed that mass cultures of fibroblasts grown from gingival explants in DB medium with 10% human serum are enriched in a phenotype that binds C1q with an affinity much higher than the rest of the population. Because of potential biologic importance of C1q receptors, the authors studied whether the interaction between C1q and this phenotype was mediated by the globular or collagenous domains of the molecule. Globular fragments were prepared by digesting C1q with collagenase, and collagenous fragments obtained after pepsin treatment. C1q binding on cells in suspension was determined by reaction with 125 I-C1q as reported. Competition experiments were performed under conditions in which intact 125 I-C1q binding saturated all available receptors. The results showed that collagenous fragments inhibited 20% of the 125 I-C1q binding to high affinity receptors, whereas inhibition by globular fragments was 70%. Unlabeled intact C1q and collagen type 1 were used as controls, and inhibited 92% and 17% of C1q binding, respectively. These studies show that C1q interacts with the fibroblast phenotype expressing high affinity receptors through its globular domain. The authors suggest that at sites of trauma, native C1 may bind to the surface of these cells via the globular domain of C1q, and that this unique phenotype may play an important role in tissue repair

  8. An Optimal Path Computation Architecture for the Cloud-Network on Software-Defined Networking

    Directory of Open Access Journals (Sweden)

    Hyunhun Cho

    2015-05-01

    Full Text Available Legacy networks do not open the precise information of the network domain because of scalability, management and commercial reasons, and it is very hard to compute an optimal path to the destination. According to today’s ICT environment change, in order to meet the new network requirements, the concept of software-defined networking (SDN has been developed as a technological alternative to overcome the limitations of the legacy network structure and to introduce innovative concepts. The purpose of this paper is to propose the application that calculates the optimal paths for general data transmission and real-time audio/video transmission, which consist of the major services of the National Research & Education Network (NREN in the SDN environment. The proposed SDN routing computation (SRC application is designed and applied in a multi-domain network for the efficient use of resources, selection of the optimal path between the multi-domains and optimal establishment of end-to-end connections.

  9. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  10. Influence of the Antenna Impedance Variation and Input Matching Network Q on LNA Key Figures

    DEFF Research Database (Denmark)

    Ruaro, Andrea; Kvist, Søren Helstrup; Gülstorff, Steen

    2012-01-01

    In this paper we present an analysis of the behaviour of a 2:4 GHz Low Noise Amplifier (LNA) for Wireless Body Area Network (WBAN) applications facing antennadetuning issue. An amplifier with ultra-low power, low voltage, and with reduced component count is prototyped to validate simulation results......, then the behaviour is analyzed through simulations based on data measured on real users. The analysis shows that the designed LNA is stable to the antenna impedance variation expectable in most cases, while highlights the possible risks associated to a high-Q input matching network when used in a context prone...

  11. An introduction to computer networks

    CERN Document Server

    Rizvi, SAM

    2011-01-01

    AN INTRODUCTION TO COMPUTER NETWORKS is a comprehensive text book which is focused and designed to elaborate the technical contents in the light of TCP/IP reference model exploring both digital and analog data communication. Various communication protocols of different layers are discussed along with their pseudo-code. This book covers the detailed and practical information about the network layer alongwith information about IP including IPV6, OSPF, and internet multicasting. It also covers TCP congestion control and emphasizes on the basic principles of fundamental importance concerning the technology and architecture and provides detailed discussion of leading edge topics of data communication, LAN & Network Layer.

  12. Apparently balanced t(1;7)(q21.3;q34) in an infant with Coffin-Siris syndrome.

    Science.gov (United States)

    McPherson, E W; Laneri, G; Clemens, M M; Kochmar, S J; Surti, U

    1997-09-05

    Coffin-Siris syndrome is a multiple anomaly/mental retardation syndrome characterized by "coarse" facial appearance, hypoplastic or absent nails on the fifth digits, generalized hirsutism with sparse scalp hair, hypotonia, and developmental delay. Due to several reports of affected sibs with or without a mildly affected parent, both autosomal recessive and autosomal dominant inheritance have been suggested. All previous patients with well-documented Coffin-Siris syndrome are chromosomally normal, and the gene has not been mapped. We report on an infant with typical findings of Coffin-Siris syndrome who also has a de novo apparently balanced translocation of chromosomes 1 and 7, karyotype 46,XY,t(1;7)(q21.3;q34). The parental chromosomes are normal and none of the relatives have signs of Coffin-Siris syndrome. The breakpoints 1q21.3 and 7q34 are suggested as possible locations for a Coffin-Siris gene.

  13. 1st International Conference on Computational Intelligence and Informatics

    CERN Document Server

    Prasad, V; Rani, B; Udgata, Siba; Raju, K

    2017-01-01

    The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India. .

  14. C1q protein binds to the apoptotic nucleolus and causes C1 protease degradation of nucleolar proteins.

    Science.gov (United States)

    Cai, Yitian; Teo, Boon Heng Dennis; Yeo, Joo Guan; Lu, Jinhua

    2015-09-11

    In infection, complement C1q recognizes pathogen-congregated antibodies and elicits complement activation. Among endogenous ligands, C1q binds to DNA and apoptotic cells, but whether C1q binds to nuclear DNA in apoptotic cells remains to be investigated. With UV irradiation-induced apoptosis, C1q initially bound to peripheral cellular regions in early apoptotic cells. By 6 h, binding concentrated in the nuclei to the nucleolus but not the chromatins. When nucleoli were isolated from non-apoptotic cells, C1q also bound to these structures. In vivo, C1q exists as the C1 complex (C1qC1r2C1s2), and C1q binding to ligands activates the C1r/C1s proteases. Incubation of nucleoli with C1 caused degradation of the nucleolar proteins nucleolin and nucleophosmin 1. This was inhibited by the C1 inhibitor. The nucleoli are abundant with autoantigens. C1q binding and C1r/C1s degradation of nucleolar antigens during cell apoptosis potentially reduces autoimmunity. These findings help us to understand why genetic C1q and C1r/C1s deficiencies cause systemic lupus erythematosus. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.

  15. NCBI nr-aa BLAST: CBRC-PABE-04-0003 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-PABE-04-0003 ref|NP_035814.2| vomeronasal 1 receptor, A2 [Mus musculus] sp|Q8VIC7|VN1A2_MOUSE Vomeronas...al type-1 receptor A2 (Pheromone receptor 2) (Vomeronasal type-1 receptor A9) (mV1R...2) dbj|BAB79214.1| vomeronasal receptor 1 A9 [Mus musculus] gb|AAI41637.1| Vomeronasal 1 receptor, A2 [synth...etic construct] gb|AAI40265.1| Vomeronasal 1 receptor, A2 [synthetic construct] gb|EDK99273.1| vomeronasa

  16. NCBI nr-aa BLAST: CBRC-RNOR-04-0241 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-RNOR-04-0241 ref|NP_035814.2| vomeronasal 1 receptor, A2 [Mus musculus] sp|Q8VIC7|VN1A2_MOUSE Vomeronas...al type-1 receptor A2 (Pheromone receptor 2) (Vomeronasal type-1 receptor A9) (mV1R...2) dbj|BAB79214.1| vomeronasal receptor 1 A9 [Mus musculus] gb|AAI41637.1| Vomeronasal 1 receptor, A2 [synth...etic construct] gb|AAI40265.1| Vomeronasal 1 receptor, A2 [synthetic construct] gb|EDK99273.1| vomeronasa

  17. PTA-1 computer program for treating pressure transients in hydraulic networks including the effect of pipe plasticity

    International Nuclear Information System (INIS)

    Youngdahl, C.K.; Kot, C.A.

    1977-01-01

    Pressure pulses in the intermediate sodium system of a liquid-metal-cooled fast breeder reactor, such as may originate from a sodium/water reaction in a steam generator, are propagated through the complex sodium piping network to system components such as the pump and intermediate heat exchanger. To assess the effects of such pulses on continued reliable operation of these components and to contribute to system designs which result in the mitigation of these effects, Pressure Transient Analysis (PTA) computer codes are being developed for accurately computing the transmission of pressure pulses through a complicated fluid transport system, consisting of piping, fittings and junctions, and components. PTA-1 provides an extension of the well-accepted and verified fluid hammer formulation for computing hydraulic transients in elastic or rigid piping systems to include plastic deformation effects. The accuracy of the modeling of pipe plasticity effects on transient propagation has been validated using results from two sets of Stanford Research Institute experiments. Validation of PTA-1 using the latter set of experiments is described briefly. The comparisons of PTA-1 computations with experiments show that (1) elastic-plastic deformation of LMFBR-type piping can have a significant qualitative and quantitative effect on pressure pulse propagation, even in simple systems; (2) classical fluid-hammer theory gives erroneous results when applied to situations where piping deforms plastically; and (3) the computational model incorporated in PTA-1 for predicting plastic deformation and its effect on transient propagation is accurate

  18. SPLAI: Computational Finite Element Model for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ruzana Ishak

    2006-01-01

    Full Text Available Wireless sensor network refers to a group of sensors, linked by a wireless medium to perform distributed sensing task. The primary interest is their capability in monitoring the physical environment through the deployment of numerous tiny, intelligent, wireless networked sensor nodes. Our interest consists of a sensor network, which includes a few specialized nodes called processing elements that can perform some limited computational capabilities. In this paper, we propose a model called SPLAI that allows the network to compute a finite element problem where the processing elements are modeled as the nodes in the linear triangular approximation problem. Our model also considers the case of some failures of the sensors. A simulation model to visualize this network has been developed using C++ on the Windows environment.

  19. Dynamic scaling, data-collapse and self-similarity in Barabasi-Albert networks

    Energy Technology Data Exchange (ETDEWEB)

    Hassan, M Kamrul; Pavel, Neeaj I [Theoretical Physics Group, Department of Physics, University of Dhaka, Dhaka 1000 (Bangladesh); Hassan, M Zahedul, E-mail: khassan@univdhaka.edu [Institute of Computer Science, Bangladesh Atomic Energy Commission, Dhaka 1000 (Bangladesh)

    2011-04-29

    In this paper, we show that if each node of the Barabasi-Albert (BA) network is characterized by the generalized degree q, i.e. the product of their degree k and the square root of their respective birth time, then the distribution function F(q, t) exhibits dynamic scaling F(q, t {yields} {infinity}) {approx} t{sup -1/2}{phi}(q/t{sup 1/2}) where {phi}(x) is the scaling function. We verified it by showing that a series of distinct F(q, t) versus q curves for different network sizes N collapse onto a single universal curve if we plot t{sup 1/2}F(q, t) versus q/t{sup 1/2} instead. Finally, we show that the BA network falls into two universality classes depending on whether new nodes arrive with single edge (m = 1) or with multiple edges (m > 1).

  20. Breakpoint mapping and haplotype analysis of translocation t(1;12)(q43;q21.1) in two apparently independent families with vascular phenotypes

    DEFF Research Database (Denmark)

    Luukkonen, Tiia Maria; Mehrjouy, Mana M; Pöyhönen, Minna

    2018-01-01

    BACKGROUND: The risk of serious congenital anomaly for de novo balanced translocations is estimated to be at least 6%. We identified two apparently independent families with a balanced t(1;12)(q43;q21.1) as an outcome of a "Systematic Survey of Balanced Chromosomal Rearrangements in Finns." In th...

  1. Choice Of Computer Networking Cables And Their Effect On Data ...

    African Journals Online (AJOL)

    Computer networking is the order of the day in this Information and Communication Technology (ICT) age. Although a network can be through a wireless device most local connections are done using cables. There are three main computer-networking cables namely coaxial cable, unshielded twisted pair cable and the optic ...

  2. 76 FR 42159 - Lifting of Sanctions on Person Associated With the A.Q. Khan Nuclear Procurement Network

    Science.gov (United States)

    2011-07-18

    ... DEPARTMENT OF STATE [Public Notice: 7525] Lifting of Sanctions on Person Associated With the A.Q. Khan Nuclear Procurement Network AGENCY: Bureau of International Security and Nonproliferation... the Foreign Relations Authorization Act for Fiscal Years 1994-1995 (22 U.S.C. 6301), the Export-Import...

  3. C1q Nephropathy: The Unique Underrecognized Pathological Entity

    Directory of Open Access Journals (Sweden)

    Joe Devasahayam

    2015-01-01

    Full Text Available C1q nephropathy is a rare glomerular disease with characteristic mesangial C1q deposition noted on immunofluorescence microscopy. It is histologically defined and poorly understood. Light microscopic features are heterogeneous and comprise minimal change disease (MCD, focal segmental glomerulosclerosis (FSGS, and proliferative glomerulonephritis. Clinical presentation is also diverse, and ranges from asymptomatic hematuria or proteinuria to frank nephritic or nephrotic syndrome in both children and adults. Hypertension and renal insufficiency at the time of diagnosis are common findings. Optimal treatment is not clear and is usually guided by the underlying light microscopic lesion. Corticosteroids are the mainstay of treatment, with immunosuppressive agents reserved for steroid resistant cases. The presence of nephrotic syndrome and FSGS appear to predict adverse outcomes as opposed to favorable outcomes in those with MCD. Further research is needed to establish C1q nephropathy as a universally recognized distinct clinical entity. In this paper, we discuss the current understanding of pathogenesis, histopathology, clinical features, therapeutic options, and outcomes of C1q nephropathy.

  4. Extraction of drainage networks from large terrain datasets using high throughput computing

    Science.gov (United States)

    Gong, Jianya; Xie, Jibo

    2009-02-01

    Advanced digital photogrammetry and remote sensing technology produces large terrain datasets (LTD). How to process and use these LTD has become a big challenge for GIS users. Extracting drainage networks, which are basic for hydrological applications, from LTD is one of the typical applications of digital terrain analysis (DTA) in geographical information applications. Existing serial drainage algorithms cannot deal with large data volumes in a timely fashion, and few GIS platforms can process LTD beyond the GB size. High throughput computing (HTC), a distributed parallel computing mode, is proposed to improve the efficiency of drainage networks extraction from LTD. Drainage network extraction using HTC involves two key issues: (1) how to decompose the large DEM datasets into independent computing units and (2) how to merge the separate outputs into a final result. A new decomposition method is presented in which the large datasets are partitioned into independent computing units using natural watershed boundaries instead of using regular 1-dimensional (strip-wise) and 2-dimensional (block-wise) decomposition. Because the distribution of drainage networks is strongly related to watershed boundaries, the new decomposition method is more effective and natural. The method to extract natural watershed boundaries was improved by using multi-scale DEMs instead of single-scale DEMs. A HTC environment is employed to test the proposed methods with real datasets.

  5. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Yilei Wang

    2015-01-01

    Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.

  6. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Charles J.; Faraj, Daniel A.; Inglett, Todd A.; Ratterman, Joseph D.

    2018-01-30

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

  7. LightKone Project: Lightweight Computation for Networks at the Edge

    OpenAIRE

    Van Roy, Peter; TEKK Tour Digital Wallonia

    2017-01-01

    LightKone combines two recent advances in distributed computing to enable general-purpose computing on edge networks: * Synchronization-free programming: Large-scale applications can run efficiently on edge networks by using convergent data structures (based on Lasp and Antidote from previous project SyncFree) → tolerates dynamicity and loose coupling of edge networks * Hybrid gossip: Communication can be made highly resilient on edge networks by combining gossip with classical distributed al...

  8. Computerized management of radiology department: Installation and use of local area network(LAN) by personal computers

    International Nuclear Information System (INIS)

    Lee, Young Joon; Han, Kook Sang; Geon, Do Ig; Sol, Chang Hyo; Kim, Byung Soo

    1993-01-01

    There is increasing need for network connecting personal computers(PC) together. Thus local area network(LAN) emerged, which was designed to allow multiple computers to access and share multiple files and programs and expensive peripheral devices and to communicate with each user. We build PC-LAN in our department that consisted of 1) hardware-9 sets of personal computers(IBM compatible 80386 DX, 1 set; 80286 AT, 8 sets) and cables and network interface cards (Ethernet compatible, 16 bits) that connected PC and peripheral devices 2) software - network operating system and database management system. We managed this network for 6 months. The benefits of PC-LAN were 1) multiuser (share multiple files and programs, peripheral devices) 2) real data processing 3) excellent expandability and flexibility, compatibility, easy connectivity 4) single cable for networking) rapid data transmission 5) simple and easy installation and management 6) using conventional PC's software running under DOS(Disk Operating System) without transformation 7) low networking cost. In conclusion, PC-lan provides an easier and more effective way to manage multiuser database system needed at hospital departments instead of more expensive and complex network of minicomputer or mainframe

  9. Multi-objective optimization in computer networks using metaheuristics

    CERN Document Server

    Donoso, Yezid

    2007-01-01

    Metaheuristics are widely used to solve important practical combinatorial optimization problems. Many new multicast applications emerging from the Internet-such as TV over the Internet, radio over the Internet, and multipoint video streaming-require reduced bandwidth consumption, end-to-end delay, and packet loss ratio. It is necessary to design and to provide for these kinds of applications as well as for those resources necessary for functionality. Multi-Objective Optimization in Computer Networks Using Metaheuristics provides a solution to the multi-objective problem in routing computer networks. It analyzes layer 3 (IP), layer 2 (MPLS), and layer 1 (GMPLS and wireless functions). In particular, it assesses basic optimization concepts, as well as several techniques and algorithms for the search of minimals; examines the basic multi-objective optimization concepts and the way to solve them through traditional techniques and through several metaheuristics; and demonstrates how to analytically model the compu...

  10. Language Impairment Resulting from a de novo Deletion of 7q32.1q33.

    Science.gov (United States)

    Jiménez-Romero, María S; Barcos-Martínez, Montserrat; Espejo-Portero, Isabel; Benítez-Burraco, Antonio

    2016-10-01

    We report on a girl who presents with hearing loss, behavioral disturbances (according to the Inventory for Client and Agency Planning) as well as motor and cognitive delay (according to Battelle Developmental Inventories) which have a significant impact on her speech and language abilities [according to the Peabody Picture Vocabulary Test (ed 3), and the Prueba de Lenguaje Oral de Navarra-Revisada (Navarra Oral Language Test, Revised)]. Five copy number variations (CNVs) were identified in the child: arr[hg18] 7q32.1q33(127109685-132492196)×1, 8p23.1(7156900-7359099) ×1, 15q13.1(26215673-26884937)×1, Xp22.33(17245- 102434)×3, and Xp22.33(964441-965024)×3. The pathogenicity of similar CNVs is mostly reported as unknown. The largest deletion is found in a hot spot for cognitive disease and language impairment and contains several genes involved in brain development and function, many of which have been related to developmental disorders encompassing language deficits (dyslexia, speech-sound disorder, and autism). Some of these genes interact with FOXP2 . The proband's phenotype may result from a reduced expression of some of these genes.

  11. Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool

    Science.gov (United States)

    Ruiz-Martinez, A.; Pereniguez-Garcia, F.; Marin-Lopez, R.; Ruiz-Martinez, P. M.; Skarmeta-Gomez, A. F.

    2013-01-01

    In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through…

  12. Constitutional t(5;7)(q11;p15) rearranged to acquire monosomy 7q and trisomy 1q in a patient with myelodysplastic syndrome transforming to acute myelocytic leukemia.

    Science.gov (United States)

    Ganly, Peter; McDonald, Margaret; Spearing, Ruth; Morris, Christine M

    2004-03-01

    We report the case of a 61-year-old woman who presented with a myelodysplastic syndrome (MDS) and a t(5;7)(q11.2;p15) in her bone marrow cells. Subsequent analysis of phytohemagglutinin-stimulated peripheral blood lymphocytes and cultured skin fibroblasts showed that the translocation was constitutional. Disruption of chromosome bands 5q11.2 and 7p15 has been described recurrently in MDS and acute myelocytic leukemia (AML) and, although the age of onset was not earlier than usual, it is nonetheless possible that genes interrupted by this translocation may been a predisposing factor for her condition. With progression to AML, a further rearrangement of the constitutional der(7)t(5;7) occurred, involving chromosome arm 1q. Fluorescence in situ hybridization (FISH) with whole-chromosome paints showed that the result of the second rearrangement, a t(1;7)(q32.1;q32), was observed, leading to trisomy of the segment 1q32.1 approximately qter and monosomy of the segment 7q32.1 approximately qter. The acquired imbalances, particularly loss of 7q, are commonly associated with MDS/AML and a poor prognosis; however, this patient remained in remission after treatment for more than two years before AML relapse, perhaps because the affected regions fall outside of the critical regions of imbalance.

  13. Applications of the parallel computing system using network

    International Nuclear Information System (INIS)

    Ido, Shunji; Hasebe, Hiroki

    1994-01-01

    Parallel programming is applied to multiple processors connected in Ethernet. Data exchanges between tasks located in each processing element are realized by two ways. One is socket which is standard library on recent UNIX operating systems. Another is a network connecting software, named as Parallel Virtual Machine (PVM) which is a free software developed by ORNL, to use many workstations connected to network as a parallel computer. This paper discusses the availability of parallel computing using network and UNIX workstations and comparison between specialized parallel systems (Transputer and iPSC/860) in a Monte Carlo simulation which generally shows high parallelization ratio. (author)

  14. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  15. Multiple network alignment on quantum computers

    Science.gov (United States)

    Daskin, Anmer; Grama, Ananth; Kais, Sabre

    2014-12-01

    Comparative analyses of graph-structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given graphs as input, alignment algorithms use topological information to assign a similarity score to each -tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext-Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method and show that it can deliver exponential speedups over conventional (non-quantum) methods.

  16. Information Dissemination of Public Health Emergency on Social Networks and Intelligent Computation.

    Science.gov (United States)

    Hu, Hongzhi; Mao, Huajuan; Hu, Xiaohua; Hu, Feng; Sun, Xuemin; Jing, Zaiping; Duan, Yunsuo

    2015-01-01

    Due to the extensive social influence, public health emergency has attracted great attention in today's society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event's social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution) provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback) based on ACP simulation system which was successfully applied to the analysis of A (H1N1) Flu emergency.

  17. Complement protein C1q induces maturation of human dendritic cells

    DEFF Research Database (Denmark)

    Csomor, Eszter; Bajtay, Zsuzsa; Sándor, Noémi

    2007-01-01

    Maturation of dendritic cells (DCs) is known to be induced by several stimuli, including microbial products, inflammatory cytokines and immobilized IgG, as demonstrated recently. Since immune complexes formed in vivo also contain C1q, moreover apoptotic cells and several pathogens fix C1q...... activity of the cells was assessed by measuring cytokine secretion and their ability to activate allogeneic T lymphocytes. Cytokine production by T cells co-cultured with C1q-matured DCs was also investigated. C1q, but not the structurally related mannose-binding lectin was found to bind to imMDC in a dose......-dependent manner and induced NF-kappaB translocation to the nucleus. Immobilized C1q induced maturation of MDCs and enhanced secretion of IL-12 and TNF-alpha, moreover, elevated their T-cell stimulating capacity. As IFN-gamma levels were increased in supernatants of MDC-T cell co-cultures, our data suggest that C1...

  18. C-Arm computed tomography adds diagnostic information in patients with chronic thromboembolic pulmonary hypertension and a positive V/Q SPECT

    Energy Technology Data Exchange (ETDEWEB)

    Hinrichs, Jan B.; Werncke, Thomas; Kaireit, Till [Hannover Medical School (Germany). Dept. for Diagnostic and Interventional Radiology; and others

    2017-01-15

    To determine if C-Arm computed tomography (CACT) has added diagnostic value in patients suffering from chronic thromboembolic pulmonary hypertension (CTEPH) with a positive mismatch pattern in ventilation/perfusion single photon emission computed tomography (V/Q SPECT). 28 patients (23 men, 5 women, 62±18 years) with CTEPH who had undergone SPECT, followed by CACT and right heart catheterization (RHC) were included. Two independent readers reviewed SPECT and CACT. Findings indicating CTEPH and their location (segmental or sub-segmental) were identified (V/Q mismatch in SPECT and vascular pathologies in CACT). Inter-modality agreement was calculated (Cohen's Kappa). Findings were scored on a 3-point-scale. The sum of the score (pulmonary artery CTEPH severity score (PACSS)) was calculated for each patient and imaging modality, correlated to RHC (spearman's correlation) and compared to the final therapeutic decision of the CTEPH board (including the consensus of SPECT, selective pulmonary DSA and CACT). Overall, 504 pulmonary artery segments were assessed in SPECT and CACT. SPECT had identified 266/504 (53%) arterial segments without and 238/504 (47%) segments with a V/Q mismatch indicating CTEPH. CACT detected 131/504 (26%) segments without abnormal findings and 373/504 (74%) segments with findings indicating CTEPH. Inter-modality agreement was fair (k=0.38). PACSS of CACT correlated mildly significantly with the mean pulmonary artery pressure (PAPmean; rho=0.48, p=0.01), while SPECT missed significance (rho=0.32, p=0.1). Discrepant findings were mostly attributed to a higher frequency of sub-segmental pulmonary arterial pathologies on CACT (145 sub-segmental findings indicating CTEPH) rated as normal on SPECT. In patients with CTEPH, contrast-enhanced CACT detects additional findings with a better correlation to the severity of PAPmean than V/Q SPECT. CACT indicates abnormalities even in segments without V/Q abnormalities.

  19. Visits to Tier-1 Computing Centres

    CERN Multimedia

    Dario Barberis

    At the beginning of 2007 it became clear that an enhanced level of communication is needed between the ATLAS computing organisation and the Tier-1 centres. Most usual meetings are ATLAS-centric and cannot address the issues of each Tier-1; therefore we decided to organise a series of visits to the Tier-1 centres and focus on site issues. For us, ATLAS computing management, it is most useful to realize how each Tier-1 centre is organised, and its relation to the associated Tier-2s; indeed their presence at these visits is also very useful. We hope it is also useful for sites... at least, we are told so! The usual participation includes, from the ATLAS side: computing management, operations, data placement, resources, accounting and database deployment coordinators; and from the Tier-1 side: computer centre management, system managers, Grid infrastructure people, network, storage and database experts, local ATLAS liaison people and representatives of the associated Tier-2s. Visiting Tier-1 centres (1-4). ...

  20. Genomic Anatomy of a Premier Major Histocompatibility Complex Paralogous Region on Chromosome 1q21–q22

    Science.gov (United States)

    Shiina, Takashi; Ando, Asako; Suto, Yumiko; Kasai, Fumio; Shigenari, Atsuko; Takishima, Nobusada; Kikkawa, Eri; Iwata, Kyoko; Kuwano, Yuko; Kitamura, Yuka; Matsuzawa, Yumiko; Sano, Kazumi; Nogami, Masahiro; Kawata, Hisako; Li, Suyun; Fukuzumi, Yasuhito; Yamazaki, Masaaki; Tashiro, Hiroyuki; Tamiya, Gen; Kohda, Atsushi; Okumura, Katsuzumi; Ikemura, Toshimichi; Soeda, Eiichi; Mizuki, Nobuhisa; Kimura, Minoru; Bahram, Seiamak; Inoko, Hidetoshi

    2001-01-01

    Human chromosomes 1q21–q25, 6p21.3–22.2, 9q33–q34, and 19p13.1–p13.4 carry clusters of paralogous loci, to date best defined by the flagship 6p MHC region. They have presumably been created by two rounds of large-scale genomic duplications around the time of vertebrate emergence. Phylogenetically, the 1q21–25 region seems most closely related to the 6p21.3 MHC region, as it is only the MHC paralogous region that includes bona fide MHC class I genes, the CD1 and MR1 loci. Here, to clarify the genomic structure of this model MHC paralogous region as well as to gain insight into the evolutionary dynamics of the entire quadriplication process, a detailed analysis of a critical 1.7 megabase (Mb) region was performed. To this end, a composite, deep, YAC, BAC, and PAC contig encompassing all five CD1 genes and linking the centromeric +P5 locus to the telomeric KRTC7 locus was constructed. Within this contig a 1.1-Mb BAC and PAC core segment joining CD1D to FCER1A was fully sequenced and thoroughly analyzed. This led to the mapping of a total of 41 genes (12 expressed genes, 12 possibly expressed genes, and 17 pseudogenes), among which 31 were novel. The latter include 20 olfactory receptor (OR) genes, 9 of which are potentially expressed. Importantly, CD1, SPTA1, OR, and FCERIA belong to multigene families, which have paralogues in the other three regions. Furthermore, it is noteworthy that 12 of the 13 expressed genes in the 1q21–q22 region around the CD1 loci are immunologically relevant. In addition to CD1A-E, these include SPTA1, MNDA, IFI-16, AIM2, BL1A, FY and FCERIA. This functional convergence of structurally unrelated genes is reminiscent of the 6p MHC region, and perhaps represents the emergence of yet another antigen presentation gene cluster, in this case dedicated to lipid/glycolipid antigens rather than antigen-derived peptides. [The nucleotide sequence data reported in this paper have been submitted to the DDBJ, EMBL, and GenBank databases under

  1. Development of new process network for gas chromatograph and analyzers connected with SCADA system and Digital Control Computers at Cernavoda NPP Unit 1

    International Nuclear Information System (INIS)

    Deneanu, Cornel; Popa Nemoiu, Dragos; Nica, Dana; Bucur, Cosmin

    2007-01-01

    The continuous monitoring of gas mixture concentrations (deuterium/ hydrogen/oxygen/nitrogen) accumulated in 'Moderator Cover Gas', 'Liquid Control Zone' and 'Heat Transport D 2 O Storage Tank Cover Gas', as well as the continuous monitoring of Heavy Water into Light Water concentration in 'Boilers Steam', 'Boilers Blown Down', 'Moderator heat exchangers', and 'Recirculated Water System', sensing any leaks of Cernavoda NPP U1 led to requirement of developing a new process network for gas chromatograph and analyzers connected to the SCADA system and Digital Control Computers of Cernavoda NPP Unit 1. In 2005 it was designed and implemented the process network for gas chromatograph which connected the gas chromatograph equipment to the SCADA system and Digital Control Computers of the Cernavoda NPP Unit 1. Later this process network for gas chromatograph has been extended to connect the AE13 and AE14 Fourier Transform Infrared (FTIR) analyzers with either. The Gas Chromatograph equipment measures with best accuracy the mixture gases (deuterium/ hydrogen/oxygen/nitrogen) concentration. The Fourier Transform Infrared (FTIR) AE13 and AE14 Analyzers measure the Heavy Water into Light Water concentration in Boilers Steam, Boilers BlownDown, Moderator heat exchangers, and Recirculated Water System, monitoring and signaling any leaks. The Gas Chromatograph equipment and Fourier Transform Infrared (FTIR) AE13 and AE14 Analyzers use the new OPC (Object Link Embedded for Process Control) technologies available in ABB's VistaNet network for interoperability with automation equipment. This new process network has interconnected the ABB chromatograph and Fourier Transform Infrared analyzers with plant Digital Control Computers using new technology. The result was an increased reliability and capability for inspection and improved system safety

  2. q Regulates the Development of Rheumatoid Arthritis by Modulating Th1 Differentiation.

    Science.gov (United States)

    Wang, Dashan; Liu, Yuan; Li, Yan; He, Yan; Zhang, Jiyun; Shi, Guixiu

    2017-01-01

    The G α q-containing G protein, an important member of G q/11 class, is ubiquitously expressed in mammalian cells. G α q has been found to play an important role in immune regulation and development of autoimmune disease such as rheumatoid arthritis (RA). However, how G α q participates in the pathogenesis of RA is still not fully understood. In the present study, we aimed to find out whether G α q controls RA via regulation of Th1 differentiation. We observed that the expression of G α q was negatively correlated with the expression of signature Th1 cytokine (IFN- γ ) in RA patients, which suggests a negative role of G α q in differentiation of Th1 cells. By using G α q knockout ( Gnaq-/- ) mice, we demonstrated that loss of G α q led to enhanced Th1 cell differentiation. G α q negative regulated the differentiation of Th1 cell by modulating the expression of T-bet and the activity of STAT4. Furthermore, we detected the increased ratio of Th1 cells in Gnaq-/- bone marrow (BM) chimeras spontaneously developing inflammatory arthritis. In conclusion, results presented in the study demonstrate that loss of G α q promotes the differentiation of Th1 cells and contributes to the pathogenesis of RA.

  3. NEPTUNIX 2: Operating on computers network - Catalogued procedures

    International Nuclear Information System (INIS)

    Roux, Pierre.

    1982-06-01

    NEPTUNIX 2 is a package which carries out the simulation of complex processes described by numerous non linear algebro-differential equations. Main features are: non linear or time dependent parameters, implicit form, stiff systems, dynamic change of equations leading to discontinuities on some variables. Thus the mathematical model is built with an equations set F(x,x',1,t), where t is the independent variable, x' the derivative of x and 1 an ''algebrized'' logical variable. The NEPTUNIX 2 package is divided into two successive major steps: a non numerical step and a numerical step. The numerical step, using results from a picture of the model translated in FORTRAN language, in a form fitted for the executive computer, carries out the simulmations; in this way, NEPTUNIX 2 numerical step is portable. On the opposite, the non numerical step must be executed on a series 370 IBM computer or on a compatible computer. The present manual describes NEPTUNIX 2 operating procedures when the two steps are executed on the same computer and also when the numerical step is executed on an other computer connected or not on the same computing network [fr

  4. Local computer network of the JINR Neutron Physics Laboratory

    International Nuclear Information System (INIS)

    Alfimenkov, A.V.; Vagov, V.A.; Vajdkhadze, F.

    1988-01-01

    New high-speed local computer network, where intelligent network adapter (NA) is used as hardware base, is developed in the JINR Neutron Physics Laboratory to increase operation efficiency and data transfer rate. NA consists of computer bus interface, cable former, microcomputer segment designed for both program realization of channel-level protocol and organization of bidirectional transfer of information through direct access channel between monochannel and computer memory with or witout buffering in NA operation memory device

  5. Computing for Finance

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    The finance sector is one of the driving forces for the use of distributed or Grid computing for business purposes. The speakers will review the state-of-the-art of high performance computing in the financial sector, and provide insight into how different types of Grid computing – from local clusters to global networks - are being applied to financial applications. They will also describe the use of software and techniques from physics, such as Monte Carlo simulations, in the financial world. There will be four talks of 20min each. The talk abstracts and speaker bios are listed below. This will be followed by a Q&A panel session with the speakers. From 19:00 onwards there will be a networking cocktail for audience and speakers. This is an EGEE / CERN openlab event organized in collaboration with the regional business network rezonance.ch. A webcast of the event will be made available for subsequent viewing, along with powerpoint material presented by the speakers. Attendance is free and open to all. R...

  6. Critical phenomena in communication/computation networks with various topologies and suboptimal to optimal resource allocation

    Science.gov (United States)

    Cogoni, Marco; Busonera, Giovanni; Anedda, Paolo; Zanetti, Gianluigi

    2015-01-01

    We generalize previous studies on critical phenomena in communication networks [1,2] by adding computational capabilities to the nodes. In our model, a set of tasks with random origin, destination and computational structure is distributed on a computational network, modeled as a graph. By varying the temperature of a Metropolis Montecarlo, we explore the global latency for an optimal to suboptimal resource assignment at a given time instant. By computing the two-point correlation function for the local overload, we study the behavior of the correlation distance (both for links and nodes) while approaching the congested phase: a transition from peaked to spread g(r) is seen above a critical (Montecarlo) temperature Tc. The average latency trend of the system is predicted by averaging over several network traffic realizations while maintaining a spatially detailed information for each node: a sharp decrease of performance is found over Tc independently of the workload. The globally optimized computational resource allocation and network routing defines a baseline for a future comparison of the transition behavior with respect to existing routing strategies [3,4] for different network topologies.

  7. Theoretical investigations of the IO,{sup q+} (q = 2, 3, 4) multi-charged ions: Metastability, characterization and spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Hammami, H. [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France); EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Yazidi, O. [Laboratoire de Spectroscopie Atomique Moléculaire et Applications, Département de Physique, Faculté des Sciences de Tunis, Université de Tunis-El Manar, Le Belvédère, 1060 Tunis (Tunisia); Ben El Hadj Rhouma, M. [EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Al Mogren, M. M. [Chemistry Department, Faculty of Science, King Saud University, PO Box 2455, Riyadh 11451 (Saudi Arabia); Hochlaf, M., E-mail: hochlaf@univ-mlv.fr [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France)

    2014-07-07

    Using ab initio methodology, we studied the IO{sup q+} (q = 2, 3, 4) multi-charged ions. Benchmark computations on the IO(X{sup 2}Π) neutral species allow validate the current procedure. For IO{sup 2+}, several potential wells were found on the ground and the electronic excited states potentials with potential barriers with respect to dissociation, where this dication can exist in the gas phase as long-lived metastable molecules. We confirm hence the recent observation of the dication by mass spectrometry. Moreover, we predict the existence of the metastable IO{sup 3+} trication, where a shallow potential well along the IO internuclear distance is computed. This potential well supports more than 10 vibrational levels. The IO{sup 3+} excited states are repulsive in nature, as well as the computed potentials for the IO{sup 4+} tetracation. For the bound states, we give a set of spectroscopic parameters including excitation transition energies, equilibrium distances, harmonic and anharmonic vibrational terms, and rotational constants. At the MRCI + Q/aug-cc-pV5Z(-PP) level, the adiabatic double and triple ionization energies of IO are computed to be ∼28.1 eV and ∼55.0 eV, respectively.

  8. Positron annihilation characterization of free volume in micro- and macro-modified Cu0.4Co0.4Ni0.4Mn1.8O4 ceramics

    International Nuclear Information System (INIS)

    Klym, H.; Ingram, A.; Shpotyuk, O.; Hadzaman, I.; Solntsev, V.; Hotra, O.; Popov, A.

    2016-01-01

    Free volume and pore size distribution size in functional micro and macro-micro-modified Cu 0.4 Co 0.4 Ni 0.4 Mn 1.8 O 4 ceramics are characterized by positron annihilation lifetime spectroscopy in comparison with Hg-porosimetry and scanning electron microscopy technique. Positron annihilation results are interpreted in terms of model implication positron trapping and ortho-positronium decaying. It is shown that free volume of positron traps are the same type for macro and micro modified Cu 0.4 Co 0.4 Ni 0.4 Mn 1.8 O 4 ceramics. Classic Tao-Eldrup model in spherical approximation is used to calculation of the size of nanopores smaller than 2 nm using the ortho-positronium lifetime.

  9. Advances in neural networks computational intelligence for ICT

    CERN Document Server

    Esposito, Anna; Morabito, Francesco; Pasero, Eros

    2016-01-01

    This carefully edited book is putting emphasis on computational and artificial intelligent methods for learning and their relative applications in robotics, embedded systems, and ICT interfaces for psychological and neurological diseases. The book is a follow-up of the scientific workshop on Neural Networks (WIRN 2015) held in Vietri sul Mare, Italy, from the 20th to the 22nd of May 2015. The workshop, at its 27th edition became a traditional scientific event that brought together scientists from many countries, and several scientific disciplines. Each chapter is an extended version of the original contribution presented at the workshop, and together with the reviewers’ peer revisions it also benefits from the live discussion during the presentation. The content of book is organized in the following sections. 1. Introduction, 2. Machine Learning, 3. Artificial Neural Networks: Algorithms and models, 4. Intelligent Cyberphysical and Embedded System, 5. Computational Intelligence Methods for Biomedical ICT in...

  10. Genetic networks and soft computing.

    Science.gov (United States)

    Mitra, Sushmita; Das, Ranajit; Hayashi, Yoichi

    2011-01-01

    The analysis of gene regulatory networks provides enormous information on various fundamental cellular processes involving growth, development, hormone secretion, and cellular communication. Their extraction from available gene expression profiles is a challenging problem. Such reverse engineering of genetic networks offers insight into cellular activity toward prediction of adverse effects of new drugs or possible identification of new drug targets. Tasks such as classification, clustering, and feature selection enable efficient mining of knowledge about gene interactions in the form of networks. It is known that biological data is prone to different kinds of noise and ambiguity. Soft computing tools, such as fuzzy sets, evolutionary strategies, and neurocomputing, have been found to be helpful in providing low-cost, acceptable solutions in the presence of various types of uncertainties. In this paper, we survey the role of these soft methodologies and their hybridizations, for the purpose of generating genetic networks.

  11. Anti-C1q autoantibodies in patients with neuromyelitis optica spectrum disorders.

    Science.gov (United States)

    Yoshikura, Nobuaki; Kimura, Akio; Hayashi, Yuichi; Inuzuka, Takashi

    2017-09-15

    We examined anti-complement C1q (C1q) autoantibody levels in serum and cerebrospinal fluid (CSF) samples of patients with neuromyelitis optica spectrum disorders (NMOSD). We analyzed the correlations between anti-C1q autoantibody levels and the clinical and other CSF characteristics of NMOSD. Serum and CSF anti-C1q autoantibody levels increased during the acute phase of NMOSD, reverting to the same levels as controls during remission. CSF anti-C1q autoantibody levels during the acute phase correlated with several markers reflecting disease severity, Expanded Disability Status Scale worsening, spinal cord lesion length in cases with myelitis, CSF protein and interleukin-6 levels, and CSF/serum albumin ratios. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  13. Development of formulation Q1As method for quadrupole noise prediction around a submerged cylinder

    Directory of Open Access Journals (Sweden)

    Yo-Seb Choi

    2017-09-01

    Full Text Available Recent research has shown that quadrupole noise has a significant influence on the overall characteristics of flow-induced noise and on the performance of underwater appendages such as sonar domes. However, advanced research generally uses the Ffowcs Williams–Hawkings analogy without considering the quadrupole source to reduce computational cost. In this study, flow-induced noise is predicted by using an LES turbulence model and a developed formulation, called the formulation Q1As method to properly take into account the quadrupole source. The noise around a circular cylinder in an underwater environment is examined for two cases with different velocities. The results from the method are compared to those obtained from the experiments and the permeable FW–H method. The results are in good agreement with the experimental data, with a difference of less than 1 dB, which indicates that the formulation Q1As method is suitable for use in predicting quadrupole noise around underwater appendages.

  14. Influence on serum asymmetric dimethylarginine (ADMA) concentrations of human paraoxonase 1 polymorphism (Q192R) and exposure to polycyclic aromatic hydrocarbons (PAHs) in Mexican women, a gene-environment interaction.

    Science.gov (United States)

    Ochoa-Martínez, Ángeles C; Ruíz-Vera, Tania; Almendarez-Reyna, Claudia I; Orta-García, Sandra T; Pérez-Maldonado, Iván N

    2017-11-01

    It has been demonstrated that Cardiovascular Diseases (CVD) are a consequence of the combination of genetic and environmental factors and/or the interaction between them. Therefore, the aim of this study was to evaluate the impact of polycyclic aromatic hydrocarbon (PAHs) exposure and PON1 Q192R polymorphism (genetic susceptibility) on serum asymmetric dimethylarginine (ADMA) levels in Mexican women (n = 206). Urinary 1-hydroxypyrene concentrations (1-OHP; exposure biomarker for PAHs) were quantified using a high-performance liquid chromatography technique, PON1 Q192R polymorphism was genotyped using TaqMan probes and serum ADMA concentrations were evaluated using a commercially available ELISA kit. Urinary 1-OHP levels detected in this study ranged from 0.07 to 9.37 μmol/mol of creatinine (0.13-18.0 μg/g of creatinine). Regarding allele frequency (PON1 Q192R polymorphism), the 192Q-allele frequency was 0.43 and for the 192R-allele it was 0.57. In relation to serum ADMA levels, the levels ranged from 0.06 to 1.46 μmol/L. Moreover, multiple linear regression analysis was performed and associations between urinary 1-OHP levels (β = 0.05, p = 0.002), PON1 Q192R polymorphism (β = 0.04, p = 0.003) and serum ADMA concentrations were found. Besides, an interaction (gene-environment interaction) of both independent variables (1-OHP and PON1 polymorphism) on serum ADMA levels was found (β = 0.04, p = 0.02) in the constructed multiple linear model. Therefore, according to the significance of this research, it is necessary to execute health programs to reduce cardiovascular risk in the assessed population. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Integrated evolutionary computation neural network quality controller for automated systems

    Energy Technology Data Exchange (ETDEWEB)

    Patro, S.; Kolarik, W.J. [Texas Tech Univ., Lubbock, TX (United States). Dept. of Industrial Engineering

    1999-06-01

    With increasing competition in the global market, more and more stringent quality standards and specifications are being demands at lower costs. Manufacturing applications of computing power are becoming more common. The application of neural networks to identification and control of dynamic processes has been discussed. The limitations of using neural networks for control purposes has been pointed out and a different technique, evolutionary computation, has been discussed. The results of identifying and controlling an unstable, dynamic process using evolutionary computation methods has been presented. A framework for an integrated system, using both neural networks and evolutionary computation, has been proposed to identify the process and then control the product quality, in a dynamic, multivariable system, in real-time.

  16. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    . The number of VMs of each application can be dynamically changed to match the workload and servers not needed in a particular period can be suspended to save energy. The methodology developed is based on Mixed Integer Programming (MIP) models to formalize the problems and use state of the art optimization solvers. Then, heuristics are developed to solve cases with more than 1,000 potential data center locations for the planning problem, 1,000 nodes for the cloud broker, and 128,000 servers for the VM placement problem. Solutions with very short optimality gaps, between 0% and 1.95%, are obtained, and execution time in the order of minutes for the planning problem and less than a second for real time cases. We consider that this thesis on resource provisioning of cloud computing networks includes important contributions on this research area, and innovative commercial applications based on the proposed methods have promising future.

  17. Quantum Random Networks for Type 2 Quantum Computers

    National Research Council Canada - National Science Library

    Allara, David L; Hasslacher, Brosl

    2006-01-01

    Random boolean networks (RBNs) have been studied theoretically and computationally in order to be able to use their remarkable self-healing and large basins of altercation properties as quantum computing architectures, especially...

  18. Comparison of V/Q SPECT and planar V/Q lung scintigraphy in diagnosing acute pulmonary embolism

    DEFF Research Database (Denmark)

    Borgwardt, Henrik Gutte; Mortensen, Jann; Jensen, Claus Verner

    2010-01-01

    Planar ventilation/perfusion (V/Q) scintigraphy is currently the standard method for the diagnosis of pulmonary embolism (PE) in most nuclear medicine centers. However, recent studies have shown a superior sensitivity and specificity when applying V/Q single photon emission computed tomography...... (SPECT) in diagnosing PE. This study evaluated the diagnostic performance of three-dimensional V/Q SPECT in comparison with planar V/Q scintigraphy....

  19. Computing Tutte polynomials of contact networks in classrooms

    Science.gov (United States)

    Hincapié, Doracelly; Ospina, Juan

    2013-05-01

    Objective: The topological complexity of contact networks in classrooms and the potential transmission of an infectious disease were analyzed by sex and age. Methods: The Tutte polynomials, some topological properties and the number of spanning trees were used to algebraically compute the topological complexity. Computations were made with the Maple package GraphTheory. Published data of mutually reported social contacts within a classroom taken from primary school, consisting of children in the age ranges of 4-5, 7-8 and 10-11, were used. Results: The algebraic complexity of the Tutte polynomial and the probability of disease transmission increases with age. The contact networks are not bipartite graphs, gender segregation was observed especially in younger children. Conclusion: Tutte polynomials are tools to understand the topology of the contact networks and to derive numerical indexes of such topologies. It is possible to establish relationships between the Tutte polynomial of a given contact network and the potential transmission of an infectious disease within such network

  20. Kepler Stellar Properties Catalog Update for Q1-Q17 DR25 Transit Search

    Science.gov (United States)

    Mathur, Savita; Huber, Daniel

    2016-01-01

    Huber et al. (2014) presented revised stellar properties for 196,468 Kepler targets, which were used for the Q1-Q16 TPSDV planet search (Tenenbaum et al. 2014). The catalog was based on atmospheric properties (i.e., temperature (Teff), surface gravity (log(g)), and metallicity ([FeH])) published in the literature using a variety of methods (e.g., asteroseismology, spectroscopy, exoplanet transits, photometry), which were then homogeneously fitted to a grid of Dartmouth (DSEP) isochrones (Dotter et al. 2008). The catalog was updated in early 2015 for the Q1-Q17 Data Release (DR) 24 transit search (Seader et al. 2015) based on the latest classifications of Kepler targets in the literature at that time. The methodology followed Huber et al. (2014). Here we provide updated stellar properties of 197,096 Kepler targets. Like the previous catalog, this update is based on atmospheric properties that were either published in the literature or provided by the Kepler community follow-up program (CFOP). The input values again come from different methods: asteroseismology, spectroscopy, flicker, and photometry. This catalog update was developed to support the SOC 9.3 TPSDV planet search (Twicken et al. 2016), which is expected to be the final search and data release by the Kepler project.In this document, we describe the method and the inputs that were used to build the catalog. The methodology follows Huber et al. (2014) with a few improvements as described in Section 2.

  1. C1-2 vertebral anomalies in 22q11.2 microdeletion syndrome

    Energy Technology Data Exchange (ETDEWEB)

    Konen, Osnat; Armstrong, Derek; Padfield, Nancy; Blaser, Susan [Hospital for Sick Children, Diagnostic Imaging, Toronto (Canada); Clarke, Howard [Hospital for Sick Children, Plastic Surgery, Toronto (Canada); Weksberg, Rosanna [Hospital for Sick Children, Clinical and Metabolic Genetics, Toronto (Canada)

    2008-07-15

    Chromosome 22q11.2 microdeletion syndrome (22q11DS) is characterized by cleft palate, cardiac anomalies, characteristic facies, high prevalence of skeletal anomalies and learning disability. To evaluate the prevalence of craniovertebral junction anomalies in children with 22q11DS and compare these findings to those in nonsyndromic children with velopharyngeal insufficiency (VPI). Sequential CT scans performed for presurgical carotid assessment in 76 children (45 children positive for chromosome 22q11.2 deletion and 31 negative for the deletion) with VPI were retrospectively evaluated for assessment of C1-2 anomalies. C1-2 vertebral anomalies, specifically midline C1 defects, uptilted or upswept posterior elements of C2 and fusions of C2-3, were nearly universal in our cohort of 22q11DS patients with VPI. They were strikingly absent in the majority of non-22q11DS patients with VPI. C1-2 vertebral anomalies, particularly those listed above, are important radiographic markers for 22q11DS. (orig.)

  2. C1-2 vertebral anomalies in 22q11.2 microdeletion syndrome

    International Nuclear Information System (INIS)

    Konen, Osnat; Armstrong, Derek; Padfield, Nancy; Blaser, Susan; Clarke, Howard; Weksberg, Rosanna

    2008-01-01

    Chromosome 22q11.2 microdeletion syndrome (22q11DS) is characterized by cleft palate, cardiac anomalies, characteristic facies, high prevalence of skeletal anomalies and learning disability. To evaluate the prevalence of craniovertebral junction anomalies in children with 22q11DS and compare these findings to those in nonsyndromic children with velopharyngeal insufficiency (VPI). Sequential CT scans performed for presurgical carotid assessment in 76 children (45 children positive for chromosome 22q11.2 deletion and 31 negative for the deletion) with VPI were retrospectively evaluated for assessment of C1-2 anomalies. C1-2 vertebral anomalies, specifically midline C1 defects, uptilted or upswept posterior elements of C2 and fusions of C2-3, were nearly universal in our cohort of 22q11DS patients with VPI. They were strikingly absent in the majority of non-22q11DS patients with VPI. C1-2 vertebral anomalies, particularly those listed above, are important radiographic markers for 22q11DS. (orig.)

  3. ProjectQ: an open source software framework for quantum computing

    Directory of Open Access Journals (Sweden)

    Damian S. Steiger

    2018-01-01

    Full Text Available We introduce ProjectQ, an open source software effort for quantum computing. The first release features a compiler framework capable of targeting various types of hardware, a high-performance simulator with emulation capabilities, and compiler plug-ins for circuit drawing and resource estimation. We introduce our Python-embedded domain-specific language, present the features, and provide example implementations for quantum algorithms. The framework allows testing of quantum algorithms through simulation and enables running them on actual quantum hardware using a back-end connecting to the IBM Quantum Experience cloud service. Through extension mechanisms, users can provide back-ends to further quantum hardware, and scientists working on quantum compilation can provide plug-ins for additional compilation, optimization, gate synthesis, and layout strategies.

  4. Spatiotemporal Dynamics and Reliable Computations in Recurrent Spiking Neural Networks

    Science.gov (United States)

    Pyle, Ryan; Rosenbaum, Robert

    2017-01-01

    Randomly connected networks of excitatory and inhibitory spiking neurons provide a parsimonious model of neural variability, but are notoriously unreliable for performing computations. We show that this difficulty is overcome by incorporating the well-documented dependence of connection probability on distance. Spatially extended spiking networks exhibit symmetry-breaking bifurcations and generate spatiotemporal patterns that can be trained to perform dynamical computations under a reservoir computing framework.

  5. Spatiotemporal Dynamics and Reliable Computations in Recurrent Spiking Neural Networks.

    Science.gov (United States)

    Pyle, Ryan; Rosenbaum, Robert

    2017-01-06

    Randomly connected networks of excitatory and inhibitory spiking neurons provide a parsimonious model of neural variability, but are notoriously unreliable for performing computations. We show that this difficulty is overcome by incorporating the well-documented dependence of connection probability on distance. Spatially extended spiking networks exhibit symmetry-breaking bifurcations and generate spatiotemporal patterns that can be trained to perform dynamical computations under a reservoir computing framework.

  6. Dynamics of neuromodulatory feedback determines frequency modulation in a reduced respiratory network: a computational study.

    Science.gov (United States)

    Toporikova, Natalia; Butera, Robert J

    2013-02-01

    Neuromodulators, such as amines and neuropeptides, alter the activity of neurons and neuronal networks. In this work, we investigate how neuromodulators, which activate G(q)-protein second messenger systems, can modulate the bursting frequency of neurons in a critical portion of the respiratory neural network, the pre-Bötzinger complex (preBötC). These neurons are a vital part of the ponto-medullary neuronal network, which generates a stable respiratory rhythm whose frequency is regulated by neuromodulator release from the nearby Raphe nucleus. Using a simulated 50-cell network of excitatory preBötC neurons with a heterogeneous distribution of persistent sodium conductance and Ca(2+), we determined conditions for frequency modulation in such a network by simulating interaction between Raphe and preBötC nuclei. We found that the positive feedback between the Raphe excitability and preBötC activity induces frequency modulation in the preBötC neurons. In addition, the frequency of the respiratory rhythm can be regulated via phasic release of excitatory neuromodulators from the Raphe nucleus. We predict that the application of a G(q) antagonist will eliminate this frequency modulation by the Raphe and keep the network frequency constant and low. In contrast, application of a G(q) agonist will result in a high frequency for all levels of Raphe stimulation. Our modeling results also suggest that high [K(+)] requirement in respiratory brain slice experiments may serve as a compensatory mechanism for low neuromodulatory tone. Copyright © 2012 Elsevier B.V. All rights reserved.

  7. Computational discovery of picomolar Q(o) site inhibitors of cytochrome bc1 complex.

    Science.gov (United States)

    Hao, Ge-Fei; Wang, Fu; Li, Hui; Zhu, Xiao-Lei; Yang, Wen-Chao; Huang, Li-Shar; Wu, Jia-Wei; Berry, Edward A; Yang, Guang-Fu

    2012-07-11

    A critical challenge to the fragment-based drug discovery (FBDD) is its low-throughput nature due to the necessity of biophysical method-based fragment screening. Herein, a method of pharmacophore-linked fragment virtual screening (PFVS) was successfully developed. Its application yielded the first picomolar-range Q(o) site inhibitors of the cytochrome bc(1) complex, an important membrane protein for drug and fungicide discovery. Compared with the original hit compound 4 (K(i) = 881.80 nM, porcine bc(1)), the most potent compound 4f displayed 20 507-fold improved binding affinity (K(i) = 43.00 pM). Compound 4f was proved to be a noncompetitive inhibitor with respect to the substrate cytochrome c, but a competitive inhibitor with respect to the substrate ubiquinol. Additionally, we determined the crystal structure of compound 4e (K(i) = 83.00 pM) bound to the chicken bc(1) at 2.70 Å resolution, providing a molecular basis for understanding its ultrapotency. To our knowledge, this study is the first application of the FBDD method in the discovery of picomolar inhibitors of a membrane protein. This work demonstrates that the novel PFVS approach is a high-throughput drug discovery method, independent of biophysical screening techniques.

  8. 5)BC)D)E(6GF"H8)IP¤Q R7S!T

    Indian Academy of Sciences (India)

    2009-01-11

    Jan 11, 2009 ... http://www.loksatta.com/daily/20090110/ch04.htm. #. 2. Expressindia | The Indian Express | The Financial Express| City Newslines | Screen | Kashmir Live ||. Express Computer. | Network Magaz ine Indial f es usiness TravellerExpressP harmal Express Hospitality Express Textile ||. Express TravelWorld.

  9. Information Dissemination of Public Health Emergency on Social Networks and Intelligent Computation

    Directory of Open Access Journals (Sweden)

    Hongzhi Hu

    2015-01-01

    Full Text Available Due to the extensive social influence, public health emergency has attracted great attention in today’s society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event’s social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback based on ACP simulation system which was successfully applied to the analysis of A (H1N1 Flu emergency.

  10. Assignment of FUT8 to chicken chromosome band 5q1.4 and to human chromosome 14q23.2-->q24.1 by in situ hybridization. Conserved and compared synteny between human and chicken

    NARCIS (Netherlands)

    Coullin, Ph.; Crooijmans, R.P.M.A.; Groenen, M.A.M.; Heilig, R.; Mollicone, R.; Oriol, R.; Candelier, J.J.

    2002-01-01

    The human FUT8 gene is implicated in crucial developmental stages and is overexpressed in some tumors and other malignant diseases. Based on three different experiments we have assigned the FUT8 gene to chromosome bands 14q23.2 --> q24.1 and not 14q24.3 as previously shown (Yamaguchi et al.,

  11. q-Virasoro algebra, q-conformal dimensions and free q-superstring

    International Nuclear Information System (INIS)

    Chaichian, M.

    1996-01-01

    The commutators of standard Virasoro generators and fields generate various representations of the centreless Virasoro algebra depending on a conformal dimension J of the field in question (J is related to the Bargmann index of SU(1,1) generated by L m , m=0,±1). We introduce the notion of q-conformal dimension for various oscillator realizations of q-deformed Virasoro (super)algebras proposed earlier. We use the field theoretical approach introduced recently in which the q-Virasoro currents L α (z) are expressed as Schwinger-like point-split normally ordered quadratic expressions in elementary fields. We extend this approach and probe the elementary fields A(z) (the q-superstring coordinate, momentum and fermionic field) and their powers by the q-Virasoro generators L α m (i.e. we calculate the commutators [L α m ,A(z)]) and show that to all of them can be assigned just the standard non-deformed conformal dimension. (orig.)

  12. Modular organization of proteins containing C1q-like globular domain.

    Science.gov (United States)

    Kishore, U; Reid, K B

    1999-05-01

    The first step in the activation of the classical pathway of complement cascade by immune complexes involves the binding of the six globular heads of C1q to the Fc regions of immunoglobulin G (IgG) or immunoglobulin M (IgM). The globular heads of C1q are located C-terminal to the six triple-helical stalks present in the molecule, each head is considered to be composed of the C-terminal halves (3 x 135 residues) of one A-, one B- and one C-chain. It is not known if the C-terminal globular regions, present in each of the three types of chains, are independently folded modules (with each chain having distinct binding properties towards immunoglobulins) or whether the different binding functions of C1q are dependent upon a globular structure which relies on contributions from all three chains. Recent reports of recombinant production and characterisation of soluble globular head regions of all the three chains indicate that the globular regions of C1q may adopt a modular organization, i.e., each globular head of C1q may be composed of three, structurally and functionally, independent domains, thus retaining multivalency in the form of a heterotrimer. Modules of the same type as the C1q C-terminal module are also found in a variety of noncomplement proteins that include the C-terminal regions of the human type VIII and type X collagens, precerebellin, the chipmunk hibernation proteins, the human endothelial cell protein, multimerin, the serum protein, Acrp-30 which is secreted from mouse adipocytes, and the sunfish inner-ear specific structural protein. The C1q molecule is the only one of these proteins for which, to date, a function has been ascribed to the module. The existence of a shared structural region between C1q and certain collagens may suggest an evolutionarily common ancestral precursor. Various structural and biochemical data suggest that these modules may be responsible for multimerisation through patches of aromatic residues within them.

  13. Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective

    Directory of Open Access Journals (Sweden)

    Shuo Gu

    2017-01-01

    Full Text Available With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed.

  14. Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective.

    Science.gov (United States)

    Gu, Shuo; Pei, Jianfeng

    2017-01-01

    With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed.

  15. The University of Michigan's Computer-Aided Engineering Network.

    Science.gov (United States)

    Atkins, D. E.; Olsen, Leslie A.

    1986-01-01

    Presents an overview of the Computer-Aided Engineering Network (CAEN) of the University of Michigan. Describes its arrangement of workstations, communication networks, and servers. Outlines the factors considered in hardware and software decision making. Reviews the program's impact on students. (ML)

  16. Conceptual metaphors in computer networking terminology ...

    African Journals Online (AJOL)

    Lakoff & Johnson, 1980) is used as a basic framework for analysing and explaining the occurrence of metaphor in the terminology used by computer networking professionals in the information technology (IT) industry. An analysis of linguistic ...

  17. Partial monosomy 8q and partial trisomy 9q due to the maternal translocation t(8;9(q24.3;q34.1)

    DEFF Research Database (Denmark)

    Tos, T; Alp, M Y; Eker, H K

    2014-01-01

    Partial trisomy 9q34-qter and partial monosomy 8q24.3-qter are very rare chromosomal abnormalities. Characteristic features of partial trisomy 9q34-qter are hypotonia, developmental delay, mild intellectual disability, dolichocephaly, distinct facial phenotype, long and thin fingers, and cardiac...

  18. Complement C1q regulates LPS-induced cytokine production in bone marrow-derived dendritic cells.

    Science.gov (United States)

    Yamada, Masahide; Oritani, Kenji; Kaisho, Tsuneyasu; Ishikawa, Jun; Yoshida, Hitoshi; Takahashi, Isao; Kawamoto, Shinichirou; Ishida, Naoko; Ujiie, Hidetoshi; Masaie, Hiroaki; Botto, Marina; Tomiyama, Yoshiaki; Matsuzawa, Yuji

    2004-01-01

    We show here that C1q suppresses IL-12p40 production in LPS-stimulated murine bone marrow-derived dendritic cells (BMDC). Serum IL-12p40 concentration of C1q-deficient mice was higher than that of wild-type mice after intraperitoneal LPS-injection. Because neither globular head of C1q (gC1q) nor collagen-like region of C1q (cC1q) failed to suppress LPS-induced IL-12p40 production, both gC1q and cC1q, and/or some specialized conformation of native C1q may be required for the inhibition. While C1q did not affect mRNA expression of Toll-like receptor 4 (TLR4), MD-2, and myeloid differentiation factor 88 (MyD88), BMDC treated with C1q showed the reduced activity of NF-kappaB and the delayed phosphorylation of p38, c-Jun N-terminal kinase, and extracellular signal-regulated kinase after LPS-stimulation. CpG oligodeoxynucleotide-induced IL-12p40 and TNF-alpha production, another MyD88-dependent TLR-mediated signal, was also suppressed by C1q treatment. Therefore, C1q is likely to suppress MyD88-dependent pathway in TLR-mediated signals. In contrast, C1q failed to suppress colony formation of B cells responding to LPS or LPS-induced CD40 and CD86 expression on BMDC in MyD88-deficient mice, indicating that inhibitory effects of C1q on MyD88-independent pathways may be limited. Taken together, C1q may regulate innate and adaptive immune systems via modification of signals mediated by interactions between invading pathogens and TLR.

  19. Three new pancreatic cancer susceptibility signals identified on chromosomes 1q32.1, 5p15.33 and 8q24.21

    Science.gov (United States)

    Zhang, Mingfeng; Wang, Zhaoming; Obazee, Ofure; Jia, Jinping; Childs, Erica J.; Hoskins, Jason; Figlioli, Gisella; Mocci, Evelina; Collins, Irene; Chung, Charles C.; Hautman, Christopher; Arslan, Alan A.; Beane-Freeman, Laura; Bracci, Paige M.; Buring, Julie; Duell, Eric J.; Gallinger, Steven; Giles, Graham G.; Goodman, Gary E.; Goodman, Phyllis J.; Kamineni, Aruna; Kolonel, Laurence N.; Kulke, Matthew H.; Malats, Núria; Olson, Sara H.; Sesso, Howard D.; Visvanathan, Kala; White, Emily; Zheng, Wei; Abnet, Christian C.; Albanes, Demetrius; Andreotti, Gabriella; Brais, Lauren; Bueno-de-Mesquita, H. Bas; Basso, Daniela; Berndt, Sonja I.; Boutron-Ruault, Marie-Christine; Bijlsma, Maarten F.; Brenner, Hermann; Burdette, Laurie; Campa, Daniele; Caporaso, Neil E.; Capurso, Gabriele; Cavestro, Giulia Martina; Cotterchio, Michelle; Costello, Eithne; Elena, Joanne; Boggi, Ugo; Gaziano, J. Michael; Gazouli, Maria; Giovannucci, Edward L.; Goggins, Michael; Gross, Myron; Haiman, Christopher A.; Hassan, Manal; Helzlsouer, Kathy J.; Hu, Nan; Hunter, David J.; Iskierka-Jazdzewska, Elzbieta; Jenab, Mazda; Kaaks, Rudolf; Key, Timothy J.; Khaw, Kay-Tee; Klein, Eric A.; Kogevinas, Manolis; Krogh, Vittorio; Kupcinskas, Juozas; Kurtz, Robert C.; Landi, Maria T.; Landi, Stefano; Marchand, Le Loic; Mambrini, Andrea; Mannisto, Satu; Milne, Roger L.; Neale, Rachel E.; Oberg, Ann L.; Panico, Salvatore; Patel, Alpa V.; Peeters, Petra H. M.; Peters, Ulrike; Pezzilli, Raffaele; Porta, Miquel; Purdue, Mark; Quiros, J. Ramón; Riboli, Elio; Rothman, Nathaniel; Scarpa, Aldo; Scelo, Ghislaine; Shu, Xiao-Ou; Silverman, Debra T.; Soucek, Pavel; Strobel, Oliver; Sund, Malin; Małecka-Panas, Ewa; Taylor, Philip R.; Tavano, Francesca; Travis, Ruth C.; Thornquist, Mark; Tjønneland, Anne; Tobias, Geoffrey S.; Trichopoulos, Dimitrios; Vashist, Yogesh; Vodicka, Pavel; Wactawski-Wende, Jean; Wentzensen, Nicolas; Yu, Herbert; Yu, Kai; Zeleniuch-Jacquotte, Anne; Kooperberg, Charles; Risch, Harvey A.; Jacobs, Eric J.; Li, Donghui; Fuchs, Charles; Hoover, Robert; Hartge, Patricia; Chanock, Stephen J.; Petersen, Gloria M.; Stolzenberg-Solomon, Rachael S.; Wolpin, Brian M.; Kraft, Peter; Klein, Alison P.; Canzian, Federico; Amundadottir, Laufey T.

    2016-01-01

    Genome-wide association studies (GWAS) have identified common pancreatic cancer susceptibility variants at 13 chromosomal loci in individuals of European descent. To identify new susceptibility variants, we performed imputation based on 1000 Genomes (1000G) Project data and association analysis using 5,107 case and 8,845 control subjects from 27 cohort and case-control studies that participated in the PanScan I-III GWAS. This analysis, in combination with a two-staged replication in an additional 6,076 case and 7,555 control subjects from the PANcreatic Disease ReseArch (PANDoRA) and Pancreatic Cancer Case-Control (PanC4) Consortia uncovered 3 new pancreatic cancer risk signals marked by single nucleotide polymorphisms (SNPs) rs2816938 at chromosome 1q32.1 (per allele odds ratio (OR) = 1.20, P = 4.88×10−15), rs10094872 at 8q24.21 (OR = 1.15, P = 3.22×10−9) and rs35226131 at 5p15.33 (OR = 0.71, P = 1.70×10−8). These SNPs represent independent risk variants at previously identified pancreatic cancer risk loci on chr1q32.1 (NR5A2), chr8q24.21 (MYC) and chr5p15.33 (CLPTM1L-TERT) as per analyses conditioned on previously reported susceptibility variants. We assessed expression of candidate genes at the three risk loci in histologically normal (n = 10) and tumor (n = 8) derived pancreatic tissue samples and observed a marked reduction of NR5A2 expression (chr1q32.1) in the tumors (fold change -7.6, P = 5.7×10−8). This finding was validated in a second set of paired (n = 20) histologically normal and tumor derived pancreatic tissue samples (average fold change for three NR5A2 isoforms -31.3 to -95.7, P = 7.5×10−4-2.0×10−3). Our study has identified new susceptibility variants independently conferring pancreatic cancer risk that merit functional follow-up to identify target genes and explain the underlying biology. PMID:27579533

  20. Secure network for beamline control

    International Nuclear Information System (INIS)

    Ohata, T.; Fukui, T.; Ishii, M.; Furukawa, Y.; Nakatani, T.; Matsushita, T.; Takeuchi, M.; Tanaka, R.; Ishikawa, T.

    2001-01-01

    In SPring-8, beamline control system is constructed with a highly available distributed network system. The socket based communication protocol is used for the beamline control mainly. Beamline users can control the equipment by sending simple control commands to a server process, which is running on a beamline-managing computer (Ohata et al., SPring-8 beamline control system, ICALEPCS'99, Trieste, Italy, 1999). At the beginning the network was based on the shared topology at all beamlines. Consequently, it has a risk for misapplication of the user's program to access different machines on the network system cross over beamlines. It is serious problem for the SPring-8 beamline control system, because all beamlines controlled with unified software interfaces. We introduced the switching technology and the firewalls to support network access control. Also the virtual networking (VLAN: IEEE 802.1Q) and the gigabit Ethernet technology (IEEE 802.3ab) are introduced. Thus the network security and the reliability are guaranteed at the higher level in SPring-8 beamline

  1. Prevalence and clinical significance of anti-C1q antibodies in ...

    African Journals Online (AJOL)

    Asmaa Hegazy

    2012-04-21

    Apr 21, 2012 ... sists of 20 patients with musculoskeletal manifestations, mainly arthritis ... C1q have been found in many different autoimmune diseases, ... improve our diagnostic potential, from these, anti-C1q anti- ... Subjects and methods.

  2. Planetary Candidates Observed by Kepler IV: Planet Sample from Q1-Q8 (22 Months)

    OpenAIRE

    Burke, Christopher J.; Christensen, Jessie L.; Ciardi, David R.; Morton, Timothy D.; Shporer, Avi

    2014-01-01

    We provide updates to the Kepler planet candidate sample based upon nearly two years of high-precision photometry (i.e., Q1-Q8). From an initial list of nearly 13,400 threshold crossing events, 480 new host stars are identified from their flux time series as consistent with hosting transiting planets. Potential transit signals are subjected to further analysis using the pixel-level data, which allows background eclipsing binaries to be identified through small image position shifts during tra...

  3. SVZ⊕1/q{sup 2}-expansion versus some QCD holographic models

    Energy Technology Data Exchange (ETDEWEB)

    Jugeau, F., E-mail: frederic.jugeau@if.ufrj.br [Instituto de Física, Universidade Federal do Rio de Janeiro, Caixa Postal 68528, RJ 21941-972, Rio de Janeiro (Brazil); Narison, S., E-mail: snarison@yahoo.fr [Laboratoire Particules et Univers de Montpellier, CNRS-IN2P3, Case 070, Place Eugène Bataillon, 34095 Montpellier (France); Ratsimbarison, H., E-mail: herysedra@yahoo.fr [Institute of High-Energy Physics of Madagascar (iHEP-MAD), University of Antananarivo (Madagascar)

    2013-05-13

    Considering the classical two-point correlators built from (axial-) vector, scalar q{sup ¯}q and gluonium currents, we confront results obtained using the SVZ⊕1/q{sup 2}-expansion to the ones from some QCD holographic models in the Euclidean region and with negative dilaton Φ{sub i}(z)=−|c{sub i}{sup 2}|z{sup 2}. We conclude that the presence of the 1/q{sup 2}-term in the SVZ-expansion due to a tachyonic gluon mass appears naturally in the Minimum Soft-Wall (MSW) and the Gauge/String Dual (GSD) models which can also reproduce semi-quantitatively some of the higher dimension condensate contributions appearing in the OPE. The Hard-Wall model shows a large departure from the SVZ⊕1/q{sup 2}-expansion in the vector, scalar and gluonium channels due to the absence of any power corrections. The equivalence of the MSW and GSD models is manifest in the vector channel through the relation of the dilaton parameter with the tachyonic gluon mass. For approximately reproducing the phenomenological values of the dimension d=4,6 condensates, the holographic models require a tachyonic gluon mass (α{sub s}/π)λ{sup 2}≈−(0.12–0.14) GeV{sup 2}, which is about twice the fitted phenomenological value from e{sup +}e{sup −} data. The relation of the inverse length parameter c{sub i} to the tachyonic gluon mass also shows that c{sub i} is channel dependent but not universal for a given holographic model. Using the MSW model and M{sub ρ}=0.78 GeV as input, we predict a scalar q{sup ¯}q mass M{sub S}≈(0.95–1.10) GeV and a scalar gluonium mass M{sub G}≈(1.11.3) GeV.

  4. Colorectal cancer risk variants at 8q23.3 and 11q23.1 are associated with disease phenotype in APC mutation carriers.

    Science.gov (United States)

    Ghorbanoghli, Z; Nieuwenhuis, M H; Houwing-Duistermaat, J J; Jagmohan-Changur, S; Hes, F J; Tops, C M; Wagner, A; Aalfs, C M; Verhoef, S; Gómez García, E B; Sijmons, R H; Menko, F H; Letteboer, T G; Hoogerbrugge, N; van Wezel, T; Vasen, H F A; Wijnen, J T

    2016-10-01

    Familial adenomatous polyposis (FAP) is a dominantly inherited syndrome caused by germline mutations in the APC gene and characterized by the development of multiple colorectal adenomas and a high risk of developing colorectal cancer (CRC). The severity of polyposis is correlated with the site of the APC mutation. However, there is also phenotypic variability within families with the same underlying APC mutation, suggesting that additional factors influence the severity of polyposis. Genome-wide association studies identified several single nucleotide polymorphisms (SNPs) that are associated with CRC. We assessed whether these SNPs are associated with polyp multiplicity in proven APC mutation carriers. Sixteen CRC-associated SNPs were analysed in a cohort of 419 APC germline mutation carriers from 182 families. Clinical data were retrieved from the Dutch Polyposis Registry. Allele frequencies of the SNPs were compared for patients with APC genotype as a covariate. We found a trend of association of two of the tested SNPs with the ≥100 adenoma phenotype: the C alleles of rs16892766 at 8q23.3 (OR 1.71, 95 % CI 1.05-2.76, p = 0.03, dominant model) and rs3802842 at 11q23.1 (OR 1.51, 95 % CI 1.03-2.22, p = 0.04, dominant model). We identified two risk variants that are associated with a more severe phenotype in APC mutation carriers. These risk variants may partly explain the phenotypic variability in families with the same APC gene defect. Further studies with a larger sample size are recommended to evaluate and confirm the phenotypic effect of these SNPs in FAP.

  5. Regional Attenuation in Northern California: A Comparison of Five 1-D Q Methods

    Energy Technology Data Exchange (ETDEWEB)

    Ford, S R; Dreger, D S; Mayeda, K; Walter, W R; Malagnini, L; Phillips, W S

    2007-08-03

    The determination of regional attenuation Q{sup -1} can depend upon the analysis method employed. The discrepancies between methods are due to differing parameterizations (e.g., geometrical spreading rates), employed datasets (e.g., choice of path lengths and sources), and the methodologies themselves (e.g., measurement in the frequency or time domain). Here we apply five different attenuation methodologies to a Northern California dataset. The methods are: (1) coda normalization (CN), (2) two-station (TS), (3) reverse two-station (RTS), (4) source-pair/receiver-pair (SPRP), and (5) coda-source normalization (CS). The methods are used to measure Q of the regional phase, Lg (Q{sub Lg}), and its power-law dependence on frequency of the form Q{sub 0}f{sup {eta}} with controlled parameterization in the well-studied region of Northern California using a high-quality dataset from the Berkeley Digital Seismic Network. We investigate the difference in power-law Q calculated among the methods by focusing on the San Francisco Bay Area, where knowledge of attenuation is an important part of seismic hazard mitigation. This approximately homogeneous subset of our data lies in a small region along the Franciscan block. All methods return similar power-law parameters, though the range of the joint 95% confidence regions is large (Q{sub 0} = 85 {+-} 40; {eta} = 0.65 {+-} 0.35). The RTS and TS methods differ the most from the other methods and from each other. This may be due to the removal of the site term in the RTS method, which is shown to be significant in the San Francisco Bay Area. In order to completely understand the range of power-law Q in a region, it is advisable to use several methods to calculate the model. We also test the sensitivity of each method to changes in geometrical spreading, Lg frequency bandwidth, the distance range of data, and the Lg measurement window. For a given method, there are significant differences in the power-law parameters, Q{sub 0} and {eta

  6. Q/sub 1/(1290) and Q/sub 2/(1400) decay rates and their SU(3) implications. [Rates

    Energy Technology Data Exchange (ETDEWEB)

    Carnegie, R K; Cashmore, R J; Dunwoodie, W M; Lasinski, T A; Leith, D W.G.S. [Stanford Linear Accelerator Center, Calif. (USA)

    1977-06-06

    The known information on the decay rates of the strangeness-one axial vector mesons, Q/sub 1/ and Q/sub 2/ is summarized and combined. From this information and the rate for B..--> omega pi.., the Qsub(A)-Qsub(B) mixing angle and the S-wave symmetric and antisymmetric octet couplings for vector-pseudoscalar decays of axial vector mesons are determined. If the D(1285) and the E(1420) belong to the fsup(PC)=1/sup + +/ nonet, the A/sub 1/ is found to have a mass of approximately 1.47 GeV and a large (>0.3 GeV) width.

  7. Computational cost for detecting inspiralling binaries using a network of laser interferometric detectors

    International Nuclear Information System (INIS)

    Pai, Archana; Bose, Sukanta; Dhurandhar, Sanjeev

    2002-01-01

    We extend a coherent network data-analysis strategy developed earlier for detecting Newtonian waveforms to the case of post-Newtonian (PN) waveforms. Since the PN waveform depends on the individual masses of the inspiralling binary, the parameter-space dimension increases by one from that of the Newtonian case. We obtain the number of templates and estimate the computational costs for PN waveforms: for a lower mass limit of 1M o-dot , for LIGO-I noise and with 3% maximum mismatch, the online computational speed requirement for single detector is a few Gflops; for a two-detector network it is hundreds of Gflops and for a three-detector network it is tens of Tflops. Apart from idealistic networks, we obtain results for realistic networks comprising of LIGO and VIRGO. Finally, we compare costs incurred in a coincidence detection strategy with those incurred in the coherent strategy detailed above

  8. RESEARCH OF ENGINEERING TRAFFIC IN COMPUTER UZ NETWORK USING MPLS TE TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    V. M. Pakhomovа

    2014-12-01

    Full Text Available Purpose. In railway transport of Ukraine one requires the use of computer networks of different technologies: Ethernet, Token Bus, Token Ring, FDDI and others. In combined computer networks on the railway transport it is necessary to use packet switching technology in multiprotocol networks MPLS (MultiProtocol Label Switching more effectively. They are based on the use of tags. Packet network must transmit different types of traffic with a given quality of service. The purpose of the research is development a methodology for determining the sequence of destination flows for the considered fragment of computer network of UZ. Methodology. When optimizing traffic management in MPLS networks has the important role of technology traffic engineering (Traffic Engineering, TE. The main mechanism of TE in MPLS is the use of unidirectional tunnels (MPLS TE tunnel to specify the path of the specified traffic. The mathematical model of the problem of traffic engineering in computer network of UZ technology MPLS TE was made. Computer UZ network is represented with the directed graph, their vertices are routers of computer network, and each arc simulates communication between nodes. As an optimization criterion serves the minimum value of the maximum utilization of the TE-tunnel. Findings. The six options destination flows were determined; rational sequence of flows was found, at which the maximum utilization of TE-tunnels considered a simplified fragment of a computer UZ network does not exceed 0.5. Originality. The method of solving the problem of traffic engineering in Multiprotocol network UZ technology MPLS TE was proposed; for different classes its own way is laid, depending on the bandwidth and channel loading. Practical value. Ability to determine the values of the maximum coefficient of use of TE-tunnels in computer UZ networks based on developed software model «TraffEng». The input parameters of the model: number of routers, channel capacity, the

  9. Extension of high poloidal beta scenario in DIII-D to lower q95 for steady state fusion reactor

    Science.gov (United States)

    Huang, J.; Gong, X.; Qian, J.; Ding, S.; Ren, Q.; Guo, W.; Pan, C.; Li, G.; Xia, T.; Garofalo, A.; Lao, L.; Hyatt, A.; Ferron, J.; Collins, C.; Lin, D.; McKee, G.; Rhode, T.; McClenaghan, J.; Holcomb, C.; Cui, L.; Heidbrink, W.; Zhu, Y.; Diiid Team; East Team

    2017-10-01

    DIII-D/EAST joint experiments have improved the high poloidal beta scenario with sustained large-radius internal transport barrier (ITB) extended to high plasma current Ip 1MA with q95 6.0. Slight off-axis NBCD is applied to obtain broader current density profile, ITBs can now be sustained below the previously observed βp threshold with excellent confinement (H98y2 1.8). The scenario also exhibits a local negative shear appearing with q increased at rho 0.4, which helps ITB formation and sustainment. This confirms TGLF prediction that negative magnetic shear can help recover ITB and achieve high confinement with reduced q95. Detailed analysis shows that the Shafranov shift and q profile is critical in the ITB formation at high βp regime. Supported in part by National Magnetic Confinement Fusion Program of China 2015GB102000, 2015GB110005, and US Department of Energy under DE-FC02-04ER54698.

  10. Using Microsoft Excel to compute the 5% overall site X/Q value and the 95th percentile of the distribution of doses to the nearest maximally exposed offsite individual (MEOI).

    Science.gov (United States)

    Vickers, Linda D

    2010-05-01

    This paper describes the method using Microsoft Excel (Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399) to compute the 5% overall site X/Q value and the 95th percentile of the distribution of doses to the nearest maximally exposed offsite individual (MEOI) in accordance with guidance from DOE-STD-3009-1994 and U.S. NRC Regulatory Guide 1.145-1982. The accurate determination of the 5% overall site X/Q value is the most important factor in the computation of the 95th percentile of the distribution of doses to the nearest MEOI. This method should be used to validate software codes that compute the X/Q. The 95th percentile of the distribution of doses to the nearest MEOI must be compared to the U.S. DOE Evaluation Guide of 25 rem to determine the relative severity of hazard to the public from a postulated, unmitigated design basis accident that involves an offsite release of radioactive material.

  11. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  12. The continuing saga of the /sup 1/P/sub 1/ (q-barq) mesonic states

    International Nuclear Information System (INIS)

    Dalitz, R.H.; Tuan, S.F.

    1986-01-01

    The mesonic states predicted by the quark model to have the structure (q-barq) do not allow all combinations possible for the quantum numbers (JPC). The happy situation for the /sup 3/P/sub J/ states does not hold for the /sup 1/P/sub 1/ state. The experimenter is therefore faced by a double difficulty, the difficulty of forming the /sup 1/P/sub 1/ through the channels available to him and the difficulty of detecting the /sup 1/P/sub 1/ state when it is formed. The difficulty about the detection and study of /sup 1/P/sub 1/ states is not intrinsic but circumstantial. It is not intrinsic because the B-meson is readily produced and studied, the same being true for Q/sub B/, although this has been a more confused situation because of the mixing between the Q/sub A/ and Q/sub B/ states. Porter has devoted considerable attention to the search for the /sup 1/P/sub 1/ (c-barc) state and the authors outline that discussion in this paper. They also describe the formation of the state Psi' (3685), since this has a large cross section in e/sup +/e/sup -/ annihilation, and to look for the /sup 1/P/sub 1/ state as a product among its decay modes

  13. Text, Style, and Author in Hamlet Q1

    Directory of Open Access Journals (Sweden)

    Christy Desmet

    2016-03-01

    Full Text Available The first quarto of Hamlet has traditionally been an embarrassment to attribution studies. Textual and bibliographical studies from the 1980s and beyond have permitted suspect texts to be recovered and performed, but critical appreciation tends to focus on such matters as characterization and performance possibilities rather than the text’s rhetorical integrity and aesthetic qualities. More recently, we have seen greater critical attention to Shakespeare’s suspect texts, which has increased our appreciation for and expanded our notion of Q1 Hamlet as a ‘text’. Opinion remains divided, however, on the question of who ‘wrote’ this play. This essay addresses the authorship debate somewhat indirectly by providing a different view of Hamlet Q1 based on a stylistic analysis that is grounded in Renaissance rhetoric. It characterizes the play’s style as the rhetoric of speed, with brachylogia as its representative rhetorical figure. Through review of theories about the composition of Hamlet Q1 and a rhetorical analysis of its style, the essay seeks to examine how Hamlet’s first quarto might have a recognizable style and how that style might be related to current concepts of authorship.

  14. Recurrent autoassociative networks and holistic computations

    NARCIS (Netherlands)

    Stoianov, [No Value; Amari, SI; Giles, CL; Gori, M; Piuri,

    2000-01-01

    The paper presents an experimental study of holistic computations over distributed representations (DRs) of sequences developed by the Recurrent Autoassociative Networks (KAN). Three groups of holistic operators are studied: extracting symbols at fixed position, extracting symbols at a variable

  15. The limit distribution in the q-CLT for q\\,\\geqslant \\,1 is unique and can not have a compact support

    Science.gov (United States)

    Umarov, Sabir; Tsallis, Constantino

    2016-10-01

    In a paper by Umarov et al (2008 Milan J. Math. 76 307-28), a generalization of the Fourier transform, called the q-Fourier transform, was introduced and applied for the proof of a q-generalized central limit theorem (q-CLT). Subsequently, Hilhorst illustrated (2009 Braz. J. Phys. 39 371-9 2010 J. Stat. Mech. P10023) that the q-Fourier transform for q\\gt 1, is not invertible in the space of density functions. Indeed, using an invariance principle, he constructed a family of densities with the same q-Fourier transform and noted that ‘as a consequence, the q-CLT falls short of achieving its stated goal’. The distributions constructed there have compact support. We prove now that the limit distribution in the q-CLT is unique and can not have a compact support. This result excludes all the possible counterexamples which can be constructed using the invariance principle and fills the gap mentioned by Hilhorst.

  16. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  17. Hot Chips and Hot Interconnects for High End Computing Systems

    Science.gov (United States)

    Saini, Subhash

    2005-01-01

    I will discuss several processors: 1. The Cray proprietary processor used in the Cray X1; 2. The IBM Power 3 and Power 4 used in an IBM SP 3 and IBM SP 4 systems; 3. The Intel Itanium and Xeon, used in the SGI Altix systems and clusters respectively; 4. IBM System-on-a-Chip used in IBM BlueGene/L; 5. HP Alpha EV68 processor used in DOE ASCI Q cluster; 6. SPARC64 V processor, which is used in the Fujitsu PRIMEPOWER HPC2500; 7. An NEC proprietary processor, which is used in NEC SX-6/7; 8. Power 4+ processor, which is used in Hitachi SR11000; 9. NEC proprietary processor, which is used in Earth Simulator. The IBM POWER5 and Red Storm Computing Systems will also be discussed. The architectures of these processors will first be presented, followed by interconnection networks and a description of high-end computer systems based on these processors and networks. The performance of various hardware/programming model combinations will then be compared, based on latest NAS Parallel Benchmark results (MPI, OpenMP/HPF and hybrid (MPI + OpenMP). The tutorial will conclude with a discussion of general trends in the field of high performance computing, (quantum computing, DNA computing, cellular engineering, and neural networks).

  18. DanQ: a hybrid convolutional and recurrent deep neural network for quantifying the function of DNA sequences.

    Science.gov (United States)

    Quang, Daniel; Xie, Xiaohui

    2016-06-20

    Modeling the properties and functions of DNA sequences is an important, but challenging task in the broad field of genomics. This task is particularly difficult for non-coding DNA, the vast majority of which is still poorly understood in terms of function. A powerful predictive model for the function of non-coding DNA can have enormous benefit for both basic science and translational research because over 98% of the human genome is non-coding and 93% of disease-associated variants lie in these regions. To address this need, we propose DanQ, a novel hybrid convolutional and bi-directional long short-term memory recurrent neural network framework for predicting non-coding function de novo from sequence. In the DanQ model, the convolution layer captures regulatory motifs, while the recurrent layer captures long-term dependencies between the motifs in order to learn a regulatory 'grammar' to improve predictions. DanQ improves considerably upon other models across several metrics. For some regulatory markers, DanQ can achieve over a 50% relative improvement in the area under the precision-recall curve metric compared to related models. We have made the source code available at the github repository http://github.com/uci-cbcl/DanQ. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  19. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  20. Several problems of algorithmization in integrated computation programs on third generation computers for short circuit currents in complex power networks

    Energy Technology Data Exchange (ETDEWEB)

    Krylov, V.A.; Pisarenko, V.P.

    1982-01-01

    Methods of modeling complex power networks with short circuits in the networks are described. The methods are implemented in integrated computation programs for short circuit currents and equivalents in electrical networks with a large number of branch points (up to 1000) on a computer with a limited on line memory capacity (M equals 4030 for the computer).

  1. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  2. Developments of the general computer network of NIPNE-HH

    International Nuclear Information System (INIS)

    Mirica, M.; Constantinescu, S.; Danet, A.

    1997-01-01

    Since 1991 the general computer network of NIPNE-HH was developed and connected to RNCN (Romanian National Computer Network) for research and development and it offers to the Romanian physics research community an efficient and cost-effective infrastructure to communicate and collaborate with fellow researchers abroad, and to collect and exchange the most up-to-date information in their research area. RNCN is targeted on the following main objectives: Setting up a technical and organizational infrastructure meant to provide national and international electronic services for the Romanian scientific research community; - Providing a rapid and competitive tool for the exchange of information in the framework of Research and Development (R-D) community; - Using the scientific and technical data bases available in the country and offered by the national networks from other countries through international networks; - Providing a support for information, scientific and technical co-operation. RNCN has two international links: to EBONE via ACONET (64kbps) and to EuropaNET via Hungarnet (64 kbps). The guiding principle in designing the project of general computer network of NIPNE-HH, as part of RNCN, was to implement an open system based on OSI standards taking into account the following criteria: - development of a flexible solution, according to OSI specifications; - solutions of reliable gateway with the existing network already in use,allowing the access to the worldwide networks; - using the TCP/IP transport protocol for each Local Area Network (LAN) and for the connection to RNCN; - ensuring the integration of different and heterogeneous software and hardware platforms (DOS, Windows, UNIX, VMS, Linux, etc) through some specific interfaces. The major objectives achieved in direction of developing the general computer network of NIPNE-HH are: - linking all the existing and newly installed computer equipment and providing an adequate connectivity. LANs from departments

  3. Six networks on a universal neuromorphic computing substrate

    Directory of Open Access Journals (Sweden)

    Thomas ePfeil

    2013-02-01

    Full Text Available In this study, we present a highly configurable neuromorphic computing substrate and use it for emulating several types of neural networks. At the heart of this system lies a mixed-signal chip, with analog implementations of neurons and synapses and digital transmission of action potentials. Major advantages of this emulation device, which has been explicitly designed as a universal neural network emulator, are its inherent parallelism and high acceleration factor compared to conventional computers. Its configurability allows the realization of almost arbitrary network topologies and the use of widely varied neuronal and synaptic parameters. Fixed-pattern noise inherent to analog circuitry is reduced by calibration routines. An integrated development environment allows neuroscientists to operate the device without any prior knowledge of neuromorphic circuit design. As a showcase for the capabilities of the system, we describe the successful emulation of six different neural networks which cover a broad spectrum of both structure and functionality.

  4. Six networks on a universal neuromorphic computing substrate.

    Science.gov (United States)

    Pfeil, Thomas; Grübl, Andreas; Jeltsch, Sebastian; Müller, Eric; Müller, Paul; Petrovici, Mihai A; Schmuker, Michael; Brüderle, Daniel; Schemmel, Johannes; Meier, Karlheinz

    2013-01-01

    In this study, we present a highly configurable neuromorphic computing substrate and use it for emulating several types of neural networks. At the heart of this system lies a mixed-signal chip, with analog implementations of neurons and synapses and digital transmission of action potentials. Major advantages of this emulation device, which has been explicitly designed as a universal neural network emulator, are its inherent parallelism and high acceleration factor compared to conventional computers. Its configurability allows the realization of almost arbitrary network topologies and the use of widely varied neuronal and synaptic parameters. Fixed-pattern noise inherent to analog circuitry is reduced by calibration routines. An integrated development environment allows neuroscientists to operate the device without any prior knowledge of neuromorphic circuit design. As a showcase for the capabilities of the system, we describe the successful emulation of six different neural networks which cover a broad spectrum of both structure and functionality.

  5. Latest developments for a computer aided thermohydraulic network

    International Nuclear Information System (INIS)

    Alemberti, A.; Graziosi, G.; Mini, G.; Susco, M.

    1999-01-01

    Thermohydraulic networks are I-D systems characterized by a small number of basic components (pumps, valves, heat exchangers, etc) connected by pipes and limited spatially by a defined number of boundary conditions (tanks, atmosphere, etc). The network system is simulated by the well known computer program RELAPS/mod3. Information concerning the network geometry component behaviour, initial and boundary conditions are usually supplied to the RELAPS code using an ASCII input file by means of 'input cards'. CATNET (Computer Aided Thermalhydraulic NETwork) is a graphically user interface that, under specific user guidelines which completely define its range of applicability, permits a very high level of standardization and simplification of the RELAPS/mod3 input deck development process as well as of the output processing. The characteristics of the components (pipes, valves, pumps etc), defining the network system can be entered through CATNET. The CATNET interface is provided by special functions to compute form losses in the most typical bending and branching configurations. When the input of all system components is ready, CATNET is able to generate the RELAPS/mod3 input file. Finally, by means of CATNET, the RELAPS/mod3 code can be run and its output results can be transformed to an intuitive display form. The paper presents an example of application of the CATNET interface as well as the latest developments which greatly simplified the work of the users and allowed to reduce the possibility of input errors. (authors)

  6. The C1q family of proteins: insights into the emerging non-traditional functions

    Directory of Open Access Journals (Sweden)

    Berhane eGhebrehiwet

    2012-04-01

    Full Text Available Research conducted over the past 20 years have helped us unravel not only the hidden structural and functional subtleties of human C1q, but also has catapulted the molecule from a mere recognition unit of the classical pathway to a well-recognized molecular sensor of damage modified self or non-self antigens. Thus, C1q is involved in a rapidly expanding list of pathological disorders—including autoimmunity, trophoblast migration, preeclampsia and cancer. The results of two recent reports are provided to underscore the critical role C1q plays in health and disease. First is the observation by Singh and colleagues showing that pregnant C1q-/- mice recapitulate the key features of human preeclampsia that correlate with increased fetal death. Treatment of the C1q-/- mice with pravastatin restored trophoblast invasiveness, placental blood flow, and angiogenic balance and, thus, prevented the onset of preeclampsia. Second is the report by Hong et al., which showed that C1q can induce apoptosis of prostate cancer cells by activating the tumor suppressor molecule WW-domain containing oxydoreductase (WWOX or WOX1 and destabilizing cell adhesion. Downregulation of C1q on the other hand enhanced prostate hyperplasia and cancer formation due to failure of WOX1 activation. Recent evidence also shows that C1q belongs to a family of structurally and functionally related TNFα-like family of proteins that may have arisen from a common ancestral gene. Therefore C1q not only shares the diverse functions with the TNF family of proteins, but also explains why C1q has retained some of its ancestral cytokine-like activities. This review is intended to highlight some of the structural and functional aspects of C1q by underscoring the growing list of its non-traditional functions.

  7. Networking Micro-Processors for Effective Computer Utilization in Nursing

    OpenAIRE

    Mangaroo, Jewellean; Smith, Bob; Glasser, Jay; Littell, Arthur; Saba, Virginia

    1982-01-01

    Networking as a social entity has important implications for maximizing computer resources for improved utilization in nursing. This paper describes the one process of networking of complementary resources at three institutions. Prairie View A&M University, Texas A&M University and the University of Texas School of Public Health, which has effected greater utilization of computers at the college. The results achieved in this project should have implications for nurses, users, and consumers in...

  8. ORGANIZATION OF CLOUD COMPUTING INFRASTRUCTURE BASED ON SDN NETWORK

    Directory of Open Access Journals (Sweden)

    Alexey A. Efimenko

    2013-01-01

    Full Text Available The article presents the main approaches to cloud computing infrastructure based on the SDN network in present data processing centers (DPC. The main indexes of management effectiveness of network infrastructure of DPC are determined. The examples of solutions for the creation of virtual network devices are provided.

  9. A new strategy for choosing “Q-markers” via network pharmacology, application to the quality control of a Chinese medical preparation

    Directory of Open Access Journals (Sweden)

    Wei Xiang

    2018-04-01

    Full Text Available Due to its chemical complexity, proper quality control for a Chinese medical preparation (CMP has been a great challenge. Choosing the appropriate quality markers (Q-markers for quality control of CMP is an important work. Best of all, the chosen Q-markers are the main chemical compounds from the herbals as well as the active constituents of this CMP. Only in this way the established quality control system can really achieve the purpose of controlling the quality of CMP and ensuring the safely and effectively use of CMP. To achieve the purpose, network pharmacology combined with the contents of chemical compounds in the CMP has been used in this research. We took an anti-arrhythmic CMP, Shenxian-Shengmai oral liquid (SSOL, as an example. Firstly, UPLC-QTOF-MS/MS method was used to analyze the main components of SSOL. A total of 64 compounds were unambiguously or tentatively identified and 32 of them were further validated by reference compounds. Secondly, the network was constructed based on the identified compounds to predict the effective compounds related to cardiac arrhythmias. Based on the existing database and the operation method of topology, a method of double network analysis (DNAA was proposed, from which 10 important targets in the pathway of arrhythmia were screened out, and 26 compounds had good antiarrhythmic activity. Based on the prediction results of network pharmacology along with the contents of the compounds in this CMP, ten representative compounds were chosen as the Q-markers for the quality control of SSOL. We find that five of these ten compounds, including danshensu, rosmarinic acid, salvianolic acid A, epimedin A and icariin, have antiarrhythmic activity. Then, the UPLC-DAD method was established as the control method for SSOL. Keywords: Quality marker, Network pharmacology, Quality control, Shenxian Shengmai oral liquid

  10. On QCD Q2-evolution of deuteron structure function F2D(xD, Q2) for xD>1

    International Nuclear Information System (INIS)

    Sidorov, A.V.; Tokarev, M.V.

    1995-01-01

    The deep-inelastic deuteron structure function (SF) F 2 D (x D ,Q 2 ) in the covariant approach in light-cone variables is considered. The x D and Q 2 -dependences of SF are calculated. The QCD analysis of generated data both for non-cumulative x D D >1 ranges was performed. It was shown that Q 2 -evolution of SF is valid for ranges 0.275 D D D -dependence of SF for the ranges is essentially different. 23 refs., 2 figs., 1 tab

  11. Gain of chromosome arm 1q in atypical meningioma correlates with shorter progression-free survival.

    LENUS (Irish Health Repository)

    2012-02-01

    Aims: Atypical (WHO grade II) meningiomas have moderately high recurrence rates; even for completely resected tumours, approximately one-third will recur. Post-operative radiotherapy (RT) may aid local control and improve survival, but carries the risk of side effects. More accurate prediction of recurrence risk is therefore needed for patients with atypical meningioma. Previously, we used high-resolution array CGH to identify genetic variations in 47 primary atypical meningiomas and found that approximately 60% of tumors show gain of 1q at 1q25.1 and 1q25.3 to 1q32.1 and that 1q gain appeared to correlate with shorter progression-free survival. This study aimed to validate and extend these findings in an independent sample. Methods: 86 completely resected atypical meningiomas (with 25 recurrences) from two neurosurgical centres in Ireland were identified and clinical follow up was obtained. Utilizing a dual-colour interphase FISH assay, 1q gain was assessed using BAC probes directed against 1q25.1 and 1q32.1. Results: The results confirm the high prevalence of 1q gain at these loci in atypical meningiomas. We further show that gain at 1q32.1 and age each correlate with progression-free survival in patients who have undergone complete surgical resection of atypical meningiomas. Conclusions: These independent findings suggest that assessment of 1q copy number status can add clinically useful information for the management of patients with atypical meningiomas.

  12. The super-Turing computational power of plastic recurrent neural networks.

    Science.gov (United States)

    Cabessa, Jérémie; Siegelmann, Hava T

    2014-12-01

    We study the computational capabilities of a biologically inspired neural model where the synaptic weights, the connectivity pattern, and the number of neurons can evolve over time rather than stay static. Our study focuses on the mere concept of plasticity of the model so that the nature of the updates is assumed to be not constrained. In this context, we show that the so-called plastic recurrent neural networks (RNNs) are capable of the precise super-Turing computational power--as the static analog neural networks--irrespective of whether their synaptic weights are modeled by rational or real numbers, and moreover, irrespective of whether their patterns of plasticity are restricted to bi-valued updates or expressed by any other more general form of updating. Consequently, the incorporation of only bi-valued plastic capabilities in a basic model of RNNs suffices to break the Turing barrier and achieve the super-Turing level of computation. The consideration of more general mechanisms of architectural plasticity or of real synaptic weights does not further increase the capabilities of the networks. These results support the claim that the general mechanism of plasticity is crucially involved in the computational and dynamical capabilities of biological neural networks. They further show that the super-Turing level of computation reflects in a suitable way the capabilities of brain-like models of computation.

  13. Computation of the radiation Q of dielectric-loaded electrically small antennas in integral equation formulations

    DEFF Research Database (Denmark)

    Kim, Oleksiy S.

    2016-01-01

    A new technique for estimating the impedance frequency bandwidth of electrically small antennas loaded with magneto-dielectric material from a single-frequency simulation in a surface integral equation solver is presented. The estimate is based on the inverse of the radiation Q computed using newly...... derived expressions for the stored energy and the radiated power of arbitrary coupled electric and magnetic currents in free space....

  14. A Rare Interstitial Duplication of 8q22.1–8q24.3 Associated with Syndromic Bilateral Cleft Lip/Palate

    Directory of Open Access Journals (Sweden)

    Regina Ferreira Rezek

    2014-01-01

    Full Text Available We present a rare case of 8q interstitial duplication derived from maternal balanced translocations in a patient with bilateral cleft lip and palate in syndromic form associated with other congenital malformations. G-banding cytogenetic analysis revealed a chromosomal abnormality in the form of the karyotype 46,XX der(22t(8;22(q22.1;p11.1mat. Chromosome microarray analysis evidenced a 49 Mb duplicated segment of chromosome 8q with no pathogenic imbalances on chromosome 22. Two siblings also carry the balanced translocation. We have compared this case with other “pure” trisomies of 8q patients reported in the literature and with genome wide association studies recently published. This work highlights the involvement of chromosome 8q in orofacial clefts.

  15. Functional differential equations for the q-Fourier transform of q-Gaussians

    International Nuclear Information System (INIS)

    Umarov, S; Queiros, S M Duarte

    2010-01-01

    In this paper the question 'is the q-Fourier transform of a q-Gaussian a q'-Gaussian (with some q') up to a constant factor?' is studied for the whole range of q in (- infty, 3). This question is connected with applicability of the q-Fourier transform in the study of limit processes in nonextensive statistical mechanics. Using the functional differential equation approach we prove that the answer is affirmative if and only if 1q < 3, excluding two particular cases of q < 1, namely q=1/2 and q=2/3. Complementarily, we discuss some applications of the q-Fourier transform to nonlinear partial differential equations such as the porous medium equation.

  16. Functional differential equations for the q-Fourier transform of q-Gaussians

    Energy Technology Data Exchange (ETDEWEB)

    Umarov, S [Department of Mathematics, Tufts University, Medford, MA (United States); Queiros, S M Duarte, E-mail: sdqueiro@gmail.co [Unilever R and D Port Sunlight, Quarry Road East, Wirral, CH63 3JW (United Kingdom)

    2010-02-05

    In this paper the question 'is the q-Fourier transform of a q-Gaussian a q'-Gaussian (with some q') up to a constant factor?' is studied for the whole range of q in (- infty, 3). This question is connected with applicability of the q-Fourier transform in the study of limit processes in nonextensive statistical mechanics. Using the functional differential equation approach we prove that the answer is affirmative if and only if 1 <= q < 3, excluding two particular cases of q < 1, namely q=1/2 and q=2/3. Complementarily, we discuss some applications of the q-Fourier transform to nonlinear partial differential equations such as the porous medium equation.

  17. Markov Networks in Evolutionary Computation

    CERN Document Server

    Shakya, Siddhartha

    2012-01-01

    Markov networks and other probabilistic graphical modes have recently received an upsurge in attention from Evolutionary computation community, particularly in the area of Estimation of distribution algorithms (EDAs).  EDAs have arisen as one of the most successful experiences in the application of machine learning methods in optimization, mainly due to their efficiency to solve complex real-world optimization problems and their suitability for theoretical analysis. This book focuses on the different steps involved in the conception, implementation and application of EDAs that use Markov networks, and undirected models in general. It can serve as a general introduction to EDAs but covers also an important current void in the study of these algorithms by explaining the specificities and benefits of modeling optimization problems by means of undirected probabilistic models. All major developments to date in the progressive introduction of Markov networks based EDAs are reviewed in the book. Hot current researc...

  18. Efficient computation in adaptive artificial spiking neural networks

    NARCIS (Netherlands)

    D. Zambrano (Davide); R.B.P. Nusselder (Roeland); H.S. Scholte; S.M. Bohte (Sander)

    2017-01-01

    textabstractArtificial Neural Networks (ANNs) are bio-inspired models of neural computation that have proven highly effective. Still, ANNs lack a natural notion of time, and neural units in ANNs exchange analog values in a frame-based manner, a computationally and energetically inefficient form of

  19. Computational cost for detecting inspiralling binaries using a network of laser interferometric detectors

    CERN Document Server

    Pai, A; Dhurandhar, S V

    2002-01-01

    We extend a coherent network data-analysis strategy developed earlier for detecting Newtonian waveforms to the case of post-Newtonian (PN) waveforms. Since the PN waveform depends on the individual masses of the inspiralling binary, the parameter-space dimension increases by one from that of the Newtonian case. We obtain the number of templates and estimate the computational costs for PN waveforms: for a lower mass limit of 1M sub o sub - sub d sub o sub t , for LIGO-I noise and with 3% maximum mismatch, the online computational speed requirement for single detector is a few Gflops; for a two-detector network it is hundreds of Gflops and for a three-detector network it is tens of Tflops. Apart from idealistic networks, we obtain results for realistic networks comprising of LIGO and VIRGO. Finally, we compare costs incurred in a coincidence detection strategy with those incurred in the coherent strategy detailed above.

  20. vid113_0401q -- Point coverage of sediment types from video collected on AR-04-04 McArthurII research cruise.

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — A Phantom DH2+2 remotely operated vehicle (ROV) outfitted with video equipment (and other devices) was deployed from the NOAA Ship McAurthurII (AR04-04) in an...

  1. An integrative computational analysis provides evidence for FBN1-associated network deregulation in trisomy 21

    Directory of Open Access Journals (Sweden)

    Mireia Vilardell

    2013-06-01

    Although approximately 50% of Down Syndrome (DS patients have heart abnormalities, they exhibit an overprotection against cardiac abnormalities related with the connective tissue, for example a lower risk of coronary artery disease. A recent study reported a case of a person affected by DS who carried mutations in FBN1, the gene causative for a connective tissue disorder called Marfan Syndrome (MFS. The fact that the person did not have any cardiac alterations suggested compensation effects due to DS. This observation is supported by a previous DS meta-analysis at the molecular level where we have found an overall upregulation of FBN1 (which is usually downregulated in MFS. Additionally, that result was cross-validated with independent expression data from DS heart tissue. The aim of this work is to elucidate the role of FBN1 in DS and to establish a molecular link to MFS and MFS-related syndromes using a computational approach. To reach that, we conducted different analytical approaches over two DS studies (our previous meta-analysis and independent expression data from DS heart tissue and revealed expression alterations in the FBN1 interaction network, in FBN1 co-expressed genes and FBN1-related pathways. After merging the significant results from different datasets with a Bayesian approach, we prioritized 85 genes that were able to distinguish control from DS cases. We further found evidence for several of these genes (47%, such as FBN1, DCN, and COL1A2, being dysregulated in MFS and MFS-related diseases. Consequently, we further encourage the scientific community to take into account FBN1 and its related network for the study of DS cardiovascular characteristics.

  2. Study of b anti b production in e+e- annihilation at √s = 29 GeV with the aid of neural networks

    International Nuclear Information System (INIS)

    Lambert, D.J.; Lawrence Berkeley Lab., CA

    1994-11-01

    The author presents a measurement of σ(b anti b)/σ(q anti q) in the annihilation process e + e - → q anti q → hadrons at √s = 29 GeV. The analysis is based on 66 pb -1 of data collected between 1984 and 1986 with the TPC/2γ detector at PEP. To identify bottom events, he uses a neural network with inputs that are computed from the 3-momenta of all of the observed charged hadrons in each event. He also presents a study of bias in techniques for measuring inclusive π ± , K ± , and p/anti p production in the annihilation process e + e - → b anti b → hadrons at √s = 29 GeV, using a neural network to identify bottom-quark jets. In this study, charged particles are identified by a simultaneous measurement of momentum and ionization energy loss (dE/dx)

  3. Lexicon on automatic network operation. 1, computing and electronics. Lexique de l'exploitation automatisee du reseau. Fascicule 1: informatique et electronique

    Energy Technology Data Exchange (ETDEWEB)

    1986-01-01

    This bilingual dictionary covers terminology relating to the operation of electric power networks. This particular volume includes those terms applicable to data processing, computing, electricity and electronics, telecommunications, and related equipment and processes. It is intended for use by specialists working in the field of technical specifications and in computerized network operation systems as well as for use by those working with such systems. It is in two parts: French to English and English to French.

  4. NASF transposition network: A computing network for unscrambling p-ordered vectors

    Science.gov (United States)

    Lim, R. S.

    1979-01-01

    The viewpoints of design, programming, and application of the transportation network (TN) is presented. The TN is a programmable combinational logic network that connects 521 memory modules to 512 processors. The unscrambling of p-ordered vectors to 1-ordered vectors in one cycle is described. The TN design is based upon the concept of cyclic groups from abstract algebra and primitive roots and indices from number theory. The programming of the TN is very simple, requiring only 20 bits: 10 bits for offset control and 10 bits for barrel switch shift control. This simple control is executed by the control unit (CU), not the processors. Any memory access by a processor must be coordinated with the CU and wait for all other processors to come to a synchronization point. These wait and synchronization events can be a degradation in performance to a computation. The TN application is for multidimensional data manipulation, matrix processing, and data sorting, and can also perform a perfect shuffle. Unlike other more complicated and powerful permutation networks, the TN cannot, if possible at all, unscramble non-p-ordered vectors in one cycle.

  5. International Symposium on Complex Computing-Networks

    CERN Document Server

    Sevgi, L; CCN2005; Complex computing networks: Brain-like and wave-oriented electrodynamic algorithms

    2006-01-01

    This book uniquely combines new advances in the electromagnetic and the circuits&systems theory. It integrates both fields regarding computational aspects of common interest. Emphasized subjects are those methods which mimic brain-like and electrodynamic behaviour; among these are cellular neural networks, chaos and chaotic dynamics, attractor-based computation and stream ciphers. The book contains carefully selected contributions from the Symposium CCN2005. Pictures from the bestowal of Honorary Doctorate degrees to Leon O. Chua and Leopold B. Felsen are included.

  6. Computer network time synchronization the network time protocol on earth and in space

    CERN Document Server

    Mills, David L

    2010-01-01

    Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields-from air and ground traffic control, to buying and selling goods and services, to TV network programming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.Written by the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition addresses the technological infrastructure of time dissemination, distrib

  7. The Role of Computer Networks in Aerospace Engineering.

    Science.gov (United States)

    Bishop, Ann Peterson

    1994-01-01

    Presents selected results from an empirical investigation into the use of computer networks in aerospace engineering based on data from a national mail survey. The need for user-based studies of electronic networking is discussed, and a copy of the questionnaire used in the survey is appended. (Contains 46 references.) (LRW)

  8. Mass reconstruction with a neural network

    International Nuclear Information System (INIS)

    Loennblad, L.; Peterson, C.; Roegnvaldsson, T.

    1992-01-01

    A feed-forward neural network method is developed for reconstructing the invariant mass of hadronic jets appearing in a calorimeter. The approach is illustrated in W→qanti q, where W-bosons are produced in panti p reactions at SPS collider energies. The neural network method yields results that are superior to conventional methods. This neural network application differs from the classification ones in the sense that an analog number (the mass) is computed by the network, rather than a binary decision being made. As a by-product our application clearly demonstrates the need for using 'intelligent' variables in instances when the amount of training instances is limited. (orig.)

  9. Complex network problems in physics, computer science and biology

    Science.gov (United States)

    Cojocaru, Radu Ionut

    There is a close relation between physics and mathematics and the exchange of ideas between these two sciences are well established. However until few years ago there was no such a close relation between physics and computer science. Even more, only recently biologists started to use methods and tools from statistical physics in order to study the behavior of complex system. In this thesis we concentrate on applying and analyzing several methods borrowed from computer science to biology and also we use methods from statistical physics in solving hard problems from computer science. In recent years physicists have been interested in studying the behavior of complex networks. Physics is an experimental science in which theoretical predictions are compared to experiments. In this definition, the term prediction plays a very important role: although the system is complex, it is still possible to get predictions for its behavior, but these predictions are of a probabilistic nature. Spin glasses, lattice gases or the Potts model are a few examples of complex systems in physics. Spin glasses and many frustrated antiferromagnets map exactly to computer science problems in the NP-hard class defined in Chapter 1. In Chapter 1 we discuss a common result from artificial intelligence (AI) which shows that there are some problems which are NP-complete, with the implication that these problems are difficult to solve. We introduce a few well known hard problems from computer science (Satisfiability, Coloring, Vertex Cover together with Maximum Independent Set and Number Partitioning) and then discuss their mapping to problems from physics. In Chapter 2 we provide a short review of combinatorial optimization algorithms and their applications to ground state problems in disordered systems. We discuss the cavity method initially developed for studying the Sherrington-Kirkpatrick model of spin glasses. We extend this model to the study of a specific case of spin glass on the Bethe

  10. Trichinella spiralis Calreticulin Binds Human Complement C1q As an Immune Evasion Strategy.

    Science.gov (United States)

    Zhao, Limei; Shao, Shuai; Chen, Yi; Sun, Ximeng; Sun, Ran; Huang, Jingjing; Zhan, Bin; Zhu, Xinping

    2017-01-01

    As a multicellular parasitic nematode, Trichinella spiralis regulates host immune responses by producing a variety of immunomodulatory molecules to escape from host immune attack, but the mechanisms underlying the immune evasion are not well understood. Here, we identified that T. spiralis calreticulin ( Ts -CRT), a Ca 2+ -binding protein, facilitated T. spiralis immune evasion by interacting with the first component of human classical complement pathway, C1q. In the present study, Ts -CRT was found to be expressed on the surface of different developmental stages of T. spiralis as well as in the secreted products of adult and muscle larval worms. Functional analysis identified that Ts -CRT was able to bind to human C1q, resulting in the inhibition of C1q-initiated complement classical activation pathway reflected by reduced C4/C3 generation and C1q-dependent lysis of antibody-sensitized sheep erythrocytes. Moreover, recombinant Ts -CRT (r Ts -CRT) binding to C1q suppressed C1q-induced THP-1-derived macrophages chemotaxis and reduced monocyte-macrophages release of reactive oxygen intermediates (ROIs). Blocking Ts -CRT on the surface of newborn larvae (NBL) of T. spiralis with anti- Ts -CRT antibody increased the C1q-mediated adherence of monocyte-macrophages to larvae and impaired larval infectivity. All of these results suggest that T. spiralis -expressed Ts -CRT plays crucial roles in T. spiralis immune evasion and survival in host mostly by directly binding to host complement C1q, which not only reduces C1q-mediated activation of classical complement pathway but also inhibits the C1q-induced non-complement activation of macrophages.

  11. Synchronized Pair Configuration in Virtualization-Based Lab for Learning Computer Networks

    Science.gov (United States)

    Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita

    2017-01-01

    More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…

  12. High-speed packet switching network to link computers

    CERN Document Server

    Gerard, F M

    1980-01-01

    Virtually all of the experiments conducted at CERN use minicomputers today; some simply acquire data and store results on magnetic tape while others actually control experiments and help to process the resulting data. Currently there are more than two hundred minicomputers being used in the laboratory. In order to provide the minicomputer users with access to facilities available on mainframes and also to provide intercommunication between various experimental minicomputers, CERN opted for a packet switching network back in 1975. It was decided to use Modcomp II computers as switching nodes. The only software to be taken was a communications-oriented operating system called Maxcom. Today eight Modcomp II 16-bit computers plus six newer Classic minicomputers from Modular Computer Services have been purchased for the CERNET data communications networks. The current configuration comprises 11 nodes connecting more than 40 user machines to one another and to the laboratory's central computing facility. (0 refs).

  13. Low-cost autonomous perceptron neural network inspired by quantum computation

    Science.gov (United States)

    Zidan, Mohammed; Abdel-Aty, Abdel-Haleem; El-Sadek, Alaa; Zanaty, E. A.; Abdel-Aty, Mahmoud

    2017-11-01

    Achieving low cost learning with reliable accuracy is one of the important goals to achieve intelligent machines to save time, energy and perform learning process over limited computational resources machines. In this paper, we propose an efficient algorithm for a perceptron neural network inspired by quantum computing composite from a single neuron to classify inspirable linear applications after a single training iteration O(1). The algorithm is applied over a real world data set and the results are outer performs the other state-of-the art algorithms.

  14. Mitochondria-targeted antioxidant SkQ1 improves impaired dermal wound healing in old mice.

    Science.gov (United States)

    Demyanenko, Ilya A; Popova, Ekaterina N; Zakharova, Vlada V; Ilyinskaya, Olga P; Vasilieva, Tamara V; Romashchenko, Valeria P; Fedorov, Artem V; Manskikh, Vasily N; Skulachev, Maxim V; Zinovkin, Roman A; Pletjushkina, Olga Yu; Skulachev, Vladimir P; Chernyak, Boris V

    2015-07-01

    The process of skin wound healing is delayed or impaired in aging animals. To investigate the possible role of mitochondrial reactive oxygen species (mtROS) in cutaneous wound healing of aged mice, we have applied the mitochondria-targeted antioxidant SkQ1. The SkQ1 treatment resulted in accelerated resolution of the inflammatory phase, formation of granulation tissue, vascularization and epithelization of the wounds. The wounds of SkQ1-treated mice contained increased amount of myofibroblasts which produce extracellular matrix proteins and growth factors mediating granulation tissue formation. This effect resembled SkQ1-induced differentiation of fibroblasts to myofibroblast, observed earlierin vitro. The Transforming Growth Factor beta (TGFb) produced by SkQ1-treated fibroblasts was found to stimulated motility of endothelial cells in vitro, an effect which may underlie pro-angiogenic action of SkQ1 in the wounds. In vitro experiments showed that SkQ1 prevented decomposition of VE-cadherin containing contacts and following increase in permeability of endothelial cells monolayer, induced by pro-inflammatory cytokine TNF. Prevention of excessive reaction of endothelium to the pro-inflammatory cytokine(s) might account for anti-inflammatory effect of SkQ1. Our findings point to an important role of mtROS in pathogenesis of age-related chronic wounds.

  15. Secure grid-based computing with social-network based trust management in the semantic web

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tůma, Miroslav

    2006-01-01

    Roč. 16, č. 6 (2006), s. 475-488 ISSN 1210-0552 R&D Projects: GA AV ČR 1ET100300419; GA MŠk 1M0554 Institutional research plan: CEZ:AV0Z10300504 Keywords : semantic web * grid computing * trust management * reconfigurable networks * security * hypergraph model * hypergraph algorithms Subject RIV: IN - Informatics, Computer Science

  16. General-Purpose Computation with Neural Networks: A Survey of Complexity Theoretic Results

    Czech Academy of Sciences Publication Activity Database

    Šíma, Jiří; Orponen, P.

    2003-01-01

    Roč. 15, č. 12 (2003), s. 2727-2778 ISSN 0899-7667 R&D Projects: GA AV ČR IAB2030007; GA ČR GA201/02/1456 Institutional research plan: AV0Z1030915 Keywords : computational power * computational complexity * perceptrons * radial basis functions * spiking neurons * feedforward networks * reccurent networks * probabilistic computation * analog computation Subject RIV: BA - General Mathematics Impact factor: 2.747, year: 2003

  17. 26 CFR 1.132-9 - Qualified transportation fringes.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Qualified transportation fringes. 1.132-9... Qualified transportation fringes. (a) Table of contents. This section contains a list of the questions and answers in § 1.132-9. (1) General rules. Q-1. What is a qualified transportation fringe? Q-2. What is...

  18. Bayesian Computational Sensor Networks for Aircraft Structural Health Monitoring

    Science.gov (United States)

    2016-02-02

    Virginia 22203 Air Force Research Laboratory Air Force Materiel Command 1 Final Performance Report: AFOSR T.C. Henderson , V.J. Mathews, and D...AFRL-AFOSR-VA-TR-2016-0094 Bayesian Computational Sensor Networks for Aircraft Structural Health Monitoring. Thomas Henderson UNIVERSITY OF UTAH SALT...The people who worked on this project include: Thomas C. Henderson , John Mathews, Jingru Zhou, Daimei Zhij, Ahmad Zoubi, Sabita Nahata, Dan Adams

  19. A program to compute the soft Robinson-Foulds distance between phylogenetic networks.

    Science.gov (United States)

    Lu, Bingxin; Zhang, Louxin; Leong, Hon Wai

    2017-03-14

    Over the past two decades, phylogenetic networks have been studied to model reticulate evolutionary events. The relationships among phylogenetic networks, phylogenetic trees and clusters serve as the basis for reconstruction and comparison of phylogenetic networks. To understand these relationships, two problems are raised: the tree containment problem, which asks whether a phylogenetic tree is displayed in a phylogenetic network, and the cluster containment problem, which asks whether a cluster is represented at a node in a phylogenetic network. Both the problems are NP-complete. A fast exponential-time algorithm for the cluster containment problem on arbitrary networks is developed and implemented in C. The resulting program is further extended into a computer program for fast computation of the Soft Robinson-Foulds distance between phylogenetic networks. Two computer programs are developed for facilitating reconstruction and validation of phylogenetic network models in evolutionary and comparative genomics. Our simulation tests indicated that they are fast enough for use in practice. Additionally, the distribution of the Soft Robinson-Foulds distance between phylogenetic networks is demonstrated to be unlikely normal by our simulation data.

  20. Tensor network method for reversible classical computation

    Science.gov (United States)

    Yang, Zhi-Cheng; Kourtis, Stefanos; Chamon, Claudio; Mucciolo, Eduardo R.; Ruckenstein, Andrei E.

    2018-03-01

    We develop a tensor network technique that can solve universal reversible classical computational problems, formulated as vertex models on a square lattice [Nat. Commun. 8, 15303 (2017), 10.1038/ncomms15303]. By encoding the truth table of each vertex constraint in a tensor, the total number of solutions compatible with partial inputs and outputs at the boundary can be represented as the full contraction of a tensor network. We introduce an iterative compression-decimation (ICD) scheme that performs this contraction efficiently. The ICD algorithm first propagates local constraints to longer ranges via repeated contraction-decomposition sweeps over all lattice bonds, thus achieving compression on a given length scale. It then decimates the lattice via coarse-graining tensor contractions. Repeated iterations of these two steps gradually collapse the tensor network and ultimately yield the exact tensor trace for large systems, without the need for manual control of tensor dimensions. Our protocol allows us to obtain the exact number of solutions for computations where a naive enumeration would take astronomically long times.

  1. Therapeutic effects of coenzyme Q10 on dilated cardiomyopathy. Assessment by {sup 123}I-BMIPP myocardial single photon emission computed tomography (SPECT). A multicenter trial in Osaka University Medical School Group

    Energy Technology Data Exchange (ETDEWEB)

    Nishimura, Tsunehiko; Hori, Masatsugu [Osaka Univ. (Japan). Faculty of Medicine

    1996-01-01

    To evaluate therapeutic effects of Coenzyme Q10 (CoQ10), 15 patients with dilated cardiomyopathy were investigated by {sup 123}I-BMIPP myocardial single photon emission computed tomography (SPECT). The BMIPP defect score was determined semiquantitatively by using representative short and long axial SPECT images. Mean BMIPP defect score with CoQ10 treatment was significantly low, 7.7{+-}6.1 compared to 12.7{+-}7.4 without CoQ10 treatment. On the other hand, in 8 patients of dilated cardiomyopathy, % fractional shortening using echocardiography was not different before and after CoQ10 treatment. In conclusion, {sup 123}I-BMIPP myocardial SPECT was proved to be sensitive to evaluate the therapeutic effects of CoQ10, which improve myocardial mitochondrial function, in the cases of dilated cardiomyopathy. (author).

  2. The q-dependent detrended cross-correlation analysis of stock market

    Science.gov (United States)

    Zhao, Longfeng; Li, Wei; Fenu, Andrea; Podobnik, Boris; Wang, Yougui; Stanley, H. Eugene

    2018-02-01

    Properties of the q-dependent cross-correlation matrices of the stock market have been analyzed by using random matrix theory and complex networks. The correlation structures of the fluctuations at different magnitudes have unique properties. The cross-correlations among small fluctuations are much stronger than those among large fluctuations. The large and small fluctuations are dominated by different groups of stocks. We use complex network representation to study these q-dependent matrices and discover some new identities. By utilizing those q-dependent correlation-based networks, we are able to construct some portfolios of those more independent stocks which consistently perform better. The optimal multifractal order for portfolio optimization is around q  =  2 under the mean-variance portfolio framework, and q\\in[2, 6] under the expected shortfall criterion. These results have deepened our understanding regarding the collective behavior of the complex financial system.

  3. PROFEAT Update: A Protein Features Web Server with Added Facility to Compute Network Descriptors for Studying Omics-Derived Networks.

    Science.gov (United States)

    Zhang, P; Tao, L; Zeng, X; Qin, C; Chen, S Y; Zhu, F; Yang, S Y; Li, Z R; Chen, W P; Chen, Y Z

    2017-02-03

    The studies of biological, disease, and pharmacological networks are facilitated by the systems-level investigations using computational tools. In particular, the network descriptors developed in other disciplines have found increasing applications in the study of the protein, gene regulatory, metabolic, disease, and drug-targeted networks. Facilities are provided by the public web servers for computing network descriptors, but many descriptors are not covered, including those used or useful for biological studies. We upgraded the PROFEAT web server http://bidd2.nus.edu.sg/cgi-bin/profeat2016/main.cgi for computing up to 329 network descriptors and protein-protein interaction descriptors. PROFEAT network descriptors comprehensively describe the topological and connectivity characteristics of unweighted (uniform binding constants and molecular levels), edge-weighted (varying binding constants), node-weighted (varying molecular levels), edge-node-weighted (varying binding constants and molecular levels), and directed (oriented processes) networks. The usefulness of the network descriptors is illustrated by the literature-reported studies of the biological networks derived from the genome, interactome, transcriptome, metabolome, and diseasome profiles. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Using distributed processing on a local area network to increase available computing power

    International Nuclear Information System (INIS)

    Capps, K.S.; Sherry, K.J.

    1996-01-01

    The migration from central computers to desktop computers distributed the total computing horsepower of a system over many different machines. A typical engineering office may have several networked desktop computers that are sometimes idle, especially after work hours and when people are absent. Users would benefit if applications were able to use these networked computers collectively. This paper describes a method of distributing the workload of an application on one desktop system to otherwise idle systems on the network. The authors present this discussion from a developer's viewpoint, because the developer must modify an application before the user can realize any benefit of distributed computing on available systems

  5. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers

    Science.gov (United States)

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems. PMID:29503613

  6. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers.

    Science.gov (United States)

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.

  7. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers

    Directory of Open Access Journals (Sweden)

    Jakob Jordan

    2018-02-01

    Full Text Available State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.

  8. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

    OpenAIRE

    Wang, Shuo; Zhang, Xing; Zhang, Yan; Wang, Lin; Yang, Juwo; Wang, Wenbo

    2017-01-01

    As the explosive growth of smart devices and the advent of many new applications, traffic volume has been growing exponentially. The traditional centralized network architecture cannot accommodate such user demands due to heavy burden on the backhaul links and long latency. Therefore, new architectures which bring network functions and contents to the network edge are proposed, i.e., mobile edge computing and caching. Mobile edge networks provide cloud computing and caching capabilities at th...

  9. Severe intellectual disability, omphalocele, hypospadia and high blood pressure associated to a deletion at 2q22.1q22.3: case report

    Directory of Open Access Journals (Sweden)

    Mulatinho Milene

    2012-06-01

    Full Text Available Abstract Background Recently, array-comparative genomic hybridization (aCGH platforms have significantly improved the resolution of chromosomal analysis allowing the identification of genomic copy number gains and losses smaller than 5 Mb. Here we report on a young man with unexplained severe mental retardation, autism spectrum disorder, congenital malformations comprising hypospadia and omphalocele, and episodes of high blood pressure. An ~ 6 Mb interstitial deletion that includes the causative genes is identified by oligonucleotide-based aCGH. Results Our index case exhibited a de novo chromosomal abnormality at 2q22 [del(2(q22.1q22.3dn] which was not visible at the 550 haploid band level. The deleted region includes eight genes: HNMT, SPOPL, NXPH2, LOC64702, LRP1B, KYNU, ARHGAP15 and GTDC1. Discussion aCGH revealed an ~ 6 Mb deletion in 2q22.1 to 2q22.3 in an as-yet unique clinical case associated with intellectual disability, congenital malformations and autism spectrum disorder. Interestingly, the deletion is co-localized with a fragile site (FRA2K, which could be involved in the formation of this chromosomal aberration. Further studies are needed to determine if deletions of 2q22.1 to 2q22.3 define a new microdeletion syndrome.

  10. A Multi-Vehicles, Wireless Testbed for Networked Control, Communications and Computing

    Science.gov (United States)

    Murray, Richard; Doyle, John; Effros, Michelle; Hickey, Jason; Low, Steven

    2002-03-01

    We have constructed a testbed consisting of 4 mobile vehicles (with 4 additional vehicles being completed), each with embedded computing and communications capability for use in testing new approaches for command and control across dynamic networks. The system is being used or is planned to be used for testing of a variety of communications-related technologies, including distributed command and control algorithms, dynamically reconfigurable network topologies, source coding for real-time transmission of data in lossy environments, and multi-network communications. A unique feature of the testbed is the use of vehicles that have second order dynamics. Requiring real-time feedback algorithms to stabilize the system while performing cooperative tasks. The testbed was constructed in the Caltech Vehicles Laboratory and consists of individual vehicles with PC-based computation and controls, and multiple communications devices (802.11 wireless Ethernet, Bluetooth, and infrared). The vehicles are freely moving, wheeled platforms propelled by high performance dotted fairs. The room contains an access points for an 802.11 network, overhead visual sensing (to allow emulation of CI'S signal processing), a centralized computer for emulating certain distributed computations, and network gateways to control and manipulate communications traffic.

  11. Genetically heterogeneous glioblastoma recurring with disappearance of 1p/19q losses: case report.

    Science.gov (United States)

    Ito, Motokazu; Wakabayashi, Toshihiko; Natsume, Atsushi; Hatano, Hisashi; Fujii, Masazumi; Yoshida, Jun

    2007-07-01

    Intratumor heterogeneity is of great importance in many clinical aspects of glioma biology, including tumor grading, therapeutic response, and recurrence. Modifications in the genetic features of a specific primary tumor recurring after chemo- and radiotherapy are poorly understood. We report a recurrent glioblastoma case exhibiting loss of heterozygosity (LOH) on chromosome 10q, while the primary tumor exhibited heterogeneity in the LOH status of 1p, 19q, and 10q. To determine the relationship between such modifications and heterogeneous chemosensitivity, primary cultured cells heterogeneously showing 1p/19q/10q losses were established from a surgical specimen of oligoastrocytoma and were treated with chemotherapeutic agents. A 46-year-old woman with a 1-month history of headache and visual disturbances presented to our institution. A right temporoparietal craniotomy and gross total resection were performed. The pathological diagnosis was glioblastoma multiforme with oligodendroglial components. Whereas LOH on 10q was identified at all tumor sites, only the oligodendroglial components exhibited LOH on 1p and 19q. The tumor recurred 6 months after postoperative chemotherapy using interferon-beta and ranimustine, as well as a course of fractionated external-beam radiotherapy (total dose, 60 Gy). Gene analysis revealed no 1p/19q allelic losses but only 10q LOH. Intratumor heterogeneity might be explained by the presence of more than one subclone in the primary tumor. Here, the tumor cells exhibiting 1p/19q LOH with high chemosensitivity might have been killed by the adjuvant therapy and those exhibiting 10q LOH with chemoresistance recurred. This study and our preliminary laboratory findings might suggest an approach to brain tumor physiology, diagnosis, and therapy.

  12. Thermodynamic properties of a quantum group boson gas GLp,q(2)

    International Nuclear Information System (INIS)

    Jellal, Ahmed

    2000-10-01

    An approach is proposed enabling to effectively describe the behaviour of a bosonic system. The approach uses the quantum group GL p,q (2) formalism. In effect, considering a bosonic Hamiltonian in terms of the GL p,q (2) generators, it is shown that its thermodynamic properties are connected to deformation parameters p and q. For instance, the average number of particles and the pressure have been computed. If p is fixed to be the same value for q, our approach coincides perfectly with some results developed recently in this subject. The ordinary results, of the present system, can be found when we take the limit p = q = 1. (author)

  13. Enhanced Ig production by human peripheral lymphocytes induced by aggregated C1q

    NARCIS (Netherlands)

    Daha, M. R.; Klar, N.; Hoekzema, R.; van Es, L. A.

    1990-01-01

    Because B cells express receptors for C1q, we have investigated the role of C1q in the stimulation of B cells. When B cells were cultured in the presence of C1q that had been frozen, T cells, and suboptimal concentrations of PWM, there was a dose-dependent enhancement of IgM, IgG, and IgA by the B

  14. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  15. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  16. Functional C1q is present in the skin mucus of Siberian sturgeon (Acipenser baerii).

    Science.gov (United States)

    Fan, Chunxin; Wang, Jian; Zhang, Xuguang; Song, Jiakun

    2015-01-01

    The skin mucus of fish acts as the first line of self-protection against pathogens in the aquatic environment and comprises a number of innate immune components. However, the presence of the critical classical complement component C1q, which links the innate and adaptive immune systems of mammalians, has not been explored in a primitive actinopterygian fish. In this study, we report that C1q is present in the skin mucus of the Siberian sturgeon (Acipenser baerii). The skin mucus was able to inhibit the growth of Escherichia coli. The bacteriostatic activity of the skin mucus was reduced by heating and by pre-incubation with EDTA or mouse anti-human C1q antibody. We also detected C1q protein in skin mucus using the western blot procedure and isolated a cDNA that encodes the Siberian sturgeon C1qC, which had 44.7-51.4% identity with C1qCs in teleosts and tetrapods. A phylogenetic analysis revealed that Siberian sturgeon C1qC lies at the root of the actinopterygian branch and is separate from the tetrapod branch. The C1qC transcript was expressed in many tissues as well as in skin. Our data indicate that C1q is present in the skin mucus of the Siberian sturgeon to protect against water-borne bacteria, and the C1qC found in the sturgeon may represent the primitive form of teleost and tetrapod C1qCs. © 2014 International Society of Zoological Sciences, Institute of Zoology/Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  17. Neural network evaluation of tokamak current profiles for real time control

    International Nuclear Information System (INIS)

    Wroblewski, D.

    1997-01-01

    Active feedback control of the current profile, requiring real-time determination of the current profile parameters, is envisioned for tokamaks operating in enhanced confinement regimes. The distribution of toroidal current in a tokamak is now routinely evaluated based on external (magnetic probes, flux loops) and internal (motional Stark effect) measurements of the poloidal magnetic field. However, the analysis involves reconstruction of magnetohydrodynamic equilibrium and is too intensive computationally to be performed in real time. In the present study, a neural network is used to provide a mapping from the magnetic measurements (internal and external) to selected parameters of the safety factor profile. The single-pass, feedforward calculation of output of a trained neural network is very fast, making this approach particularly suitable for real-time applications. The network was trained on a large set of simulated equilibrium data for the DIII-D tokamak. The database encompasses a large variety of current profiles including the hollow current profiles important for reversed central shear operation. The parameters of safety factor profile (a quantity related to the current profile through the magnetic field tilt angle) estimated by the neural network include central safety factor, q 0 , minimum value of q, q min , and the location of q min . Very good performance of the trained neural network both for simulated test data and for experimental datais demonstrated. copyright 1997 American Institute of Physics

  18. Integrating Network Awareness in ATLAS Distributed Computing Using the ANSE Project

    CERN Document Server

    Klimentov, Alexei; The ATLAS collaboration; Petrosyan, Artem; Batista, Jorge Horacio; Mc Kee, Shawn Patrick

    2015-01-01

    A crucial contributor to the success of the massively scaled global computing system that delivers the analysis needs of the LHC experiments is the networking infrastructure upon which the system is built. The experiments have been able to exploit excellent high-bandwidth networking in adapting their computing models for the most efficient utilization of resources. New advanced networking technologies now becoming available such as software defined networking hold the potential of further leveraging the network to optimize workflows and dataflows, through proactive control of the network fabric on the part of high level applications such as experiment workload management and data management systems. End to end monitoring of networks using perfSONAR combined with data flow performance metrics further allows applications to adapt based on real time conditions. We will describe efforts underway in ATLAS on integrating network awareness at the application level, particularly in workload management, building upon ...

  19. Simulation and Noise Analysis of Multimedia Transmission in Optical CDMA Computer Networks

    Directory of Open Access Journals (Sweden)

    Nasaruddin Nasaruddin

    2013-09-01

    Full Text Available This paper simulates and analyzes noise of multimedia transmission in a flexible optical code division multiple access (OCDMA computer network with different quality of service (QoS requirements. To achieve multimedia transmission in OCDMA, we have proposed strict variable-weight optical orthogonal codes (VW-OOCs, which can guarantee the smallest correlation value of one by the optimal design. In developing multimedia transmission for computer network, a simulation tool is essential in analyzing the effectiveness of various transmissions of services. In this paper, implementation models are proposed to analyze the multimedia transmission in the representative of OCDMA computer networks by using MATLAB simulink tools. Simulation results of the models are discussed including spectrums outputs of transmitted signals, superimposed signals, received signals, and eye diagrams with and without noise. Using the proposed models, multimedia OCDMA computer network using the strict VW-OOC is practically evaluated. Furthermore, system performance is also evaluated by considering avalanche photodiode (APD noise and thermal noise. The results show that the system performance depends on code weight, received laser power, APD noise, and thermal noise which should be considered as important parameters to design and implement multimedia transmission in OCDMA computer networks.

  20. Simulation and Noise Analysis of Multimedia Transmission in Optical CDMA Computer Networks

    Directory of Open Access Journals (Sweden)

    Nasaruddin

    2009-11-01

    Full Text Available This paper simulates and analyzes noise of multimedia transmission in a flexible optical code division multiple access (OCDMA computer network with different quality of service (QoS requirements. To achieve multimedia transmission in OCDMA, we have proposed strict variable-weight optical orthogonal codes (VW-OOCs, which can guarantee the smallest correlation value of one by the optimal design. In developing multimedia transmission for computer network, a simulation tool is essential in analyzing the effectiveness of various transmissions of services. In this paper, implementation models are proposed to analyze the multimedia transmission in the representative of OCDMA computer networks by using MATLAB simulink tools. Simulation results of the models are discussed including spectrums outputs of transmitted signals, superimposed signals, received signals, and eye diagrams with and without noise. Using the proposed models, multimedia OCDMA computer network using the strict VW-OOC is practically evaluated. Furthermore, system performance is also evaluated by considering avalanche photodiode (APD noise and thermal noise. The results show that the system performance depends on code weight, received laser power, APD noise, and thermal noise which should be considered as important parameters to design and implement multimedia transmission in OCDMA computer networks.

  1. Trisomy 1q42-qter associated with monosomy 6q27-qter: a case report.

    Science.gov (United States)

    Tartaglia, Edoardo; Mastrantonio, Pasquale; Costa, Davide; Giugliano, Brunella; Porcellini, Antonio; Costagliola, Ciro

    2011-01-01

    Partial trisomy 1q42-qter is a rare chromosomal aberration. Most cases arise from de novo unbalanced translocations or from unbalanced inheritance of parental balanced rearrangements. Descriptive case report. A 4-year-old boy had shown an increased neck translucency at the fetal ultrasound examination performed at the 11th week of gestation. Amniocentesis, performed at the 18th week of gestation, did not demonstrate any genetic abnormality. A second fetal ultrasound examination, carried out at the 35th week of gestation, showed congenital clubfeet and hydrocephalus. At birth, clinical examination revealed congenital bilateral ventriculomegaly, bilateral congenital equinovarus clubfeet, low-set ears, plagiocephaly, micrognathia, hypertelorism, prominent forehead, broad nasal bridge, hypertonic syndrome, and inguinal hernia. Ophthalmologic consultation showed the presence of optic pit in his left eye. Genetic counseling was performed. Chromosome analysis demonstrated a partial trisomy 1q42.2-qter associated with a partial monosomy 6q27-qter. Moreover, deletions of the distal region on the long arm of chromosome 6 are frequently associated with both ocular abnormalities and several solid tumor types. Moderate mental and psychomotor retardation has occurred. This case emphasizes the importance of scheduling a screening test for eye diseases and tumor in these patients.

  2. Network architecture test-beds as platforms for ubiquitous computing.

    Science.gov (United States)

    Roscoe, Timothy

    2008-10-28

    Distributed systems research, and in particular ubiquitous computing, has traditionally assumed the Internet as a basic underlying communications substrate. Recently, however, the networking research community has come to question the fundamental design or 'architecture' of the Internet. This has been led by two observations: first, that the Internet as it stands is now almost impossible to evolve to support new functionality; and second, that modern applications of all kinds now use the Internet rather differently, and frequently implement their own 'overlay' networks above it to work around its perceived deficiencies. In this paper, I discuss recent academic projects to allow disruptive change to the Internet architecture, and also outline a radically different view of networking for ubiquitous computing that such proposals might facilitate.

  3. Computational Aspects of Sensor Network Protocols (Distributed Sensor Network Simulator

    Directory of Open Access Journals (Sweden)

    Vasanth Iyer

    2009-08-01

    Full Text Available In this work, we model the sensor networks as an unsupervised learning and clustering process. We classify nodes according to its static distribution to form known class densities (CCPD. These densities are chosen from specific cross-layer features which maximizes lifetime of power-aware routing algorithms. To circumvent computational complexities of a power-ware communication STACK we introduce path-loss models at the nodes only for high density deployments. We study the cluster heads and formulate the data handling capacity for an expected deployment and use localized probability models to fuse the data with its side information before transmission. So each cluster head has a unique Pmax but not all cluster heads have the same measured value. In a lossless mode if there are no faults in the sensor network then we can show that the highest probability given by Pmax is ambiguous if its frequency is ≤ n/2 otherwise it can be determined by a local function. We further show that the event detection at the cluster heads can be modelled with a pattern 2m and m, the number of bits can be a correlated pattern of 2 bits and for a tight lower bound we use 3-bit Huffman codes which have entropy < 1. These local algorithms are further studied to optimize on power, fault detection and to maximize on the distributed routing algorithm used at the higher layers. From these bounds in large network, it is observed that the power dissipation is network size invariant. The performance of the routing algorithms solely based on success of finding healthy nodes in a large distribution. It is also observed that if the network size is kept constant and the density of the nodes is kept closer then the local pathloss model effects the performance of the routing algorithms. We also obtain the maximum intensity of transmitting nodes for a given category of routing algorithms for an outage constraint, i.e., the lifetime of sensor network.

  4. Report on Computing and Networking in the Space Science Laboratory by the SSL Computer Committee

    Science.gov (United States)

    Gallagher, D. L. (Editor)

    1993-01-01

    The Space Science Laboratory (SSL) at Marshall Space Flight Center is a multiprogram facility. Scientific research is conducted in four discipline areas: earth science and applications, solar-terrestrial physics, astrophysics, and microgravity science and applications. Representatives from each of these discipline areas participate in a Laboratory computer requirements committee, which developed this document. The purpose is to establish and discuss Laboratory objectives for computing and networking in support of science. The purpose is also to lay the foundation for a collective, multiprogram approach to providing these services. Special recognition is given to the importance of the national and international efforts of our research communities toward the development of interoperable, network-based computer applications.

  5. An Algebraic Construction of Duality Functions for the Stochastic {U_q( A_n^{(1)})} Vertex Model and Its Degenerations

    Science.gov (United States)

    Kuan, Jeffrey

    2018-03-01

    A recent paper (Kuniba in Nucl Phys B 913:248-277, 2016) introduced the stochastic U}_q(A_n^{(1)})} vertex model. The stochastic S-matrix is related to the R-matrix of the quantum group {U_q(A_n^{(1)})} by a gauge transformation. We will show that a certain function {D^+_{m intertwines with the transfer matrix and its space reversal. When interpreting the transfer matrix as the transition matrix of a discrete-time totally asymmetric particle system on the one-dimensional lattice Z , the function {D^+m} becomes a Markov duality function {Dm} which only depends on q and the vertical spin parameters μ_x. By considering degenerations in the spectral parameter, the duality results also hold on a finite lattice with closed boundary conditions, and for a continuous-time degeneration. This duality function had previously appeared in a multi-species ASEP(q, j) process (Kuan in A multi-species ASEP(q, j) and q-TAZRP with stochastic duality, 2017). The proof here uses that the R-matrix intertwines with the co-product, but does not explicitly use the Yang-Baxter equation. It will also be shown that the stochastic U}_q(A_n^{(1)})} is a multi-species version of a stochastic vertex model studied in Borodin and Petrov (Higher spin six vertex model and symmetric rational functions, 2016) and Corwin and Petrov (Commun Math Phys 343:651-700, 2016). This will be done by generalizing the fusion process of Corwin and Petrov (2016) and showing that it matches the fusion of Kulish and yu (Lett Math Phys 5:393-403, 1981) up to the gauge transformation. We also show, by direct computation, that the multi-species q-Hahn Boson process (which arises at a special value of the spectral parameter) also satisfies duality with respect to D_∞, generalizing the single-species result of Corwin (Int Math Res Not 2015:5577-5603, 2015).

  6. Novel Ethernet Based Optical Local Area Networks for Computer Interconnection

    NARCIS (Netherlands)

    Radovanovic, Igor; van Etten, Wim; Taniman, R.O.; Kleinkiskamp, Ronny

    2003-01-01

    In this paper we present new optical local area networks for fiber-to-the-desk application. Presented networks are expected to bring a solution for having optical fibers all the way to computers. To bring the overall implementation costs down we have based our networks on short-wavelength optical

  7. Status and Trends in Networking at LHC Tier1 Facilities

    Science.gov (United States)

    Bobyshev, A.; DeMar, P.; Grigaliunas, V.; Bigrow, J.; Hoeft, B.; Reymund, A.

    2012-12-01

    The LHC is entering its fourth year of production operation. Most Tier1 facilities have been in operation for almost a decade, when development and ramp-up efforts are included. LHC's distributed computing model is based on the availability of high capacity, high performance network facilities for both the WAN and LAN data movement, particularly within the Tier1 centers. As a result, the Tier1 centers tend to be on the leading edge of data center networking technology. In this paper, we analyze past and current developments in Tier1 LAN networking, as well as extrapolating where we anticipate networking technology is heading. Our analysis will include examination into the following areas: • Evolution of Tier1 centers to their current state • Evolving data center networking models and how they apply to Tier1 centers • Impact of emerging network technologies (e.g. 10GE-connected hosts, 40GE/100GE links, IPv6) on Tier1 centers • Trends in WAN data movement and emergence of software-defined WAN network capabilities • Network virtualization

  8. Status and Trends in Networking at LHC Tier1 Facilities

    International Nuclear Information System (INIS)

    Bobyshev, A; DeMar, P; Grigaliunas, V; Bigrow, J; Hoeft, B; Reymund, A

    2012-01-01

    The LHC is entering its fourth year of production operation. Most Tier1 facilities have been in operation for almost a decade, when development and ramp-up efforts are included. LHC's distributed computing model is based on the availability of high capacity, high performance network facilities for both the WAN and LAN data movement, particularly within the Tier1 centers. As a result, the Tier1 centers tend to be on the leading edge of data center networking technology. In this paper, we analyze past and current developments in Tier1 LAN networking, as well as extrapolating where we anticipate networking technology is heading. Our analysis will include examination into the following areas: • Evolution of Tier1 centers to their current state • Evolving data center networking models and how they apply to Tier1 centers • Impact of emerging network technologies (e.g. 10GE-connected hosts, 40GE/100GE links, IPv6) on Tier1 centers • Trends in WAN data movement and emergence of software-defined WAN network capabilities • Network virtualization

  9. Status and trends in networking at LHC Tier1 facilities

    Energy Technology Data Exchange (ETDEWEB)

    Bobyshev, A. [Fermilab; DeMar, P. [Fermilab; Grigaliunas, V. [Fermilab; Bigrow, J. [Brookhaven; Hoeft, B. [KIT, Karlsruhe; Reymund, A. [KIT, Karlsruhe

    2012-06-22

    The LHC is entering its fourth year of production operation. Most Tier1 facilities have been in operation for almost a decade, when development and ramp-up efforts are included. LHC's distributed computing model is based on the availability of high capacity, high performance network facilities for both the WAN and LAN data movement, particularly within the Tier1 centers. As a result, the Tier1 centers tend to be on the leading edge of data center networking technology. In this paper, we analyze past and current developments in Tier1 LAN networking, as well as extrapolating where we anticipate networking technology is heading. Our analysis will include examination into the following areas: Evolution of Tier1 centers to their current state Evolving data center networking models and how they apply to Tier1 centers Impact of emerging network technologies (e.g. 10GE-connected hosts, 40GE/100GE links, IPv6) on Tier1 centers Trends in WAN data movement and emergence of software-defined WAN network capabilities Network virtualization

  10. Marked variability in clinical presentation and outcome of patients with C1q immunodeficiency

    DEFF Research Database (Denmark)

    van Schaarenburg, Rosanne A; Schejbel, Lone; Truedsson, Lennart

    2015-01-01

    OBJECTIVE: Globally approximately 60 cases of C1q deficiency have been described with a high prevalence of Systemic Lupus Erythematosus (SLE). So far treatment has been guided by the clinical presentation rather than the underlying C1q deficiency. Recently, it was shown that C1q production can...

  11. Zero Action on Perfect Crystals for U_q(G_2^{(1}

    Directory of Open Access Journals (Sweden)

    Kailash C. Misra

    2010-03-01

    Full Text Available The actions of 0-Kashiwara operators on the U_q(G_2^{(1}-crystal B_l in [Yamane S., J. Algebra 210 (1998, 440-486] are made explicit by using a similarity technique from that of a U_q'(D_4^{(3}-crystal. It is shown that {B_l}_{l ≥ 1} forms a coherent family of perfect crystals.

  12. Ad Hoc Wireless Networking and Shared Computation for Autonomous Multirobot Systems

    OpenAIRE

    Bevilacqua, Riccardo; Hall, Jason S.; Horning, James; Romano, Marcello

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.2514/1.40734 A wireless ad hoc network is introduced that enables inter-robot communication and shared computation among multiple robots with PC/104-based single board computers running the real-time application interface patched Linux operating system. Through the use of IEEE 802.11 ad hoc technology and User Datagram Protocol, each robot is able to exchange data without the need of a centralized router ...

  13. Machine learning based Intelligent cognitive network using fog computing

    Science.gov (United States)

    Lu, Jingyang; Li, Lun; Chen, Genshe; Shen, Dan; Pham, Khanh; Blasch, Erik

    2017-05-01

    In this paper, a Cognitive Radio Network (CRN) based on artificial intelligence is proposed to distribute the limited radio spectrum resources more efficiently. The CRN framework can analyze the time-sensitive signal data close to the signal source using fog computing with different types of machine learning techniques. Depending on the computational capabilities of the fog nodes, different features and machine learning techniques are chosen to optimize spectrum allocation. Also, the computing nodes send the periodic signal summary which is much smaller than the original signal to the cloud so that the overall system spectrum source allocation strategies are dynamically updated. Applying fog computing, the system is more adaptive to the local environment and robust to spectrum changes. As most of the signal data is processed at the fog level, it further strengthens the system security by reducing the communication burden of the communications network.

  14. Evidence for a novel chemotactic C1q domain-containing factor in the leech nerve cord.

    Science.gov (United States)

    Tahtouh, Muriel; Croq, Françoise; Vizioli, Jacopo; Sautiere, Pierre-Eric; Van Camp, Christelle; Salzet, Michel; Daha, Mohamed R; Pestel, Joël; Lefebvre, Christophe

    2009-02-01

    In vertebrates, central nervous system (CNS) protection is dependent on many immune cells including microglial cells. Indeed, activated microglial cells are involved in neuroinflammation mechanisms by interacting with numerous immune factors. Unlike vertebrates, some lophotrochozoan invertebrates can fully repair their CNS following injury. In the medicinal leech Hirudo medicinalis, the recruitment of microglial cells at the lesion site is essential for sprouting of injured axons. Interestingly, a new molecule homologous to vertebrate C1q was characterized in leech, named HmC1q (for H. medicinalis) and detected in neurons and glial cells. In chemotaxis assays, leech microglial cells were demonstrated to respond to human C1q. The chemotactic activity was reduced when microglia was preincubated with signaling pathway inhibitors (Pertussis Toxin or wortmannin) or anti-human gC1qR antibody suggesting the involvement of gC1qR in C1q-mediated migration in leech. Assays using cells preincubated with NO chelator (cPTIO) showed that C1q-mediated migration was associated to NO production. Of interest, by using anti-HmC1q antibodies, HmC1q released in the culture medium was shown to exhibit a similar chemotactic effect on microglial cells as human C1q. In summary, we have identified, for the first time, a molecule homologous to mammalian C1q in leech CNS. Its chemoattractant activity on microglia highlights a new investigation field leading to better understand leech CNS repair mechanisms.

  15. AN EVALUATION AND IMPLEMENTATION OF COLLABORATIVE AND SOCIAL NETWORKING TECHNOLOGIES FOR COMPUTER EDUCATION

    Directory of Open Access Journals (Sweden)

    Ronnie Cheung

    2011-06-01

    Full Text Available We have developed a collaborative and social networking environment that integrates the knowledge and skills in communication and computing studies with a multimedia development project. The outcomes of the students’ projects show that computer literacy can be enhanced through a cluster of communication, social, and digital skills. Experience in implementing a web-based social networking environment shows that the new media is an effective means of enriching knowledge by sharing in computer literacy projects. The completed assignments, projects, and self-reflection reports demonstrate that the students were able to achieve the learning outcomes of a computer literacy course in multimedia development. The students were able to assess the effectiveness of a variety of media through the development of media presentations in a web-based, social-networking environment. In the collaborative and social-networking environment, students were able to collaborate and communicate with their team members to solve problems, resolve conflicts, make decisions, and work as a team to complete tasks. Our experience has shown that social networking environments are effective for computer literacy education, and the development of the new media is emerging as the core knowledge for computer literacy education.

  16. Measurement of the Elastic Ep Cross Section at Q2 = 0.66, 1.10, 1.51 and 1.65 Gev2

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yang [College of William and Mary, Williamsburg, VA (United States)

    2017-08-01

    The nucleon form factors have been investigated by physicists for decades because of their fundamental importance. The world data of the proton magnetic form factor GMp has been focused on Q2 lower than 5 GeV2 and they have large uncertainties at higher Q2. Jefferson Lab experiment E12-07-108 aims to improve the accuracy of the e ? p elastic cross section to better than 2% over a Q2 range of 7 ? 14 GeV2. From 2015 to 2016, the e ? p elastic cross section was measured over a wide range of Q2 from 0.66 ? 12.56 GeV2 at the Thomas Jefferson National Accelerator Facility in Virginia, USA. An unpolarized electron beam was scattered o? a cryogenic hydrogen target and the scattered electron was detected in the high resolution spectrometers. This thesis focuses on the cross section calculations of the data taken in the spring of 2015, where Q2 = 0.66, 1.10, 1.51 and 1.66 GeV2. At Q2 = 0.66 GeV2, an uncertainty < 3% was achieved and < 5% was achieved for the other three Q2 at the moment. The results were compared with the world data and the good agreement provides confidence for the experimental measurements at higher Q2.

  17. Student Motivation in Computer Networking Courses

    OpenAIRE

    Wen-Jung Hsin, PhD

    2007-01-01

    This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners’ daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct, self-motivation.

  18. GVMD Model Predictions for the Low Q2 Behaviour of the Spin Structure Function g1(x,Q2) and of the DHGHY Integral I(Q2)

    International Nuclear Information System (INIS)

    Badelek, B.; Kwiecinski, J.; Ziaja, B.

    2002-01-01

    Predictions for g 1 ( x, Q 2 ) at low Q 2 are obtained in the framework of the GVMD model. contributions from both light and heavy vector mesons are evaluated. The DHGHY sum rule is employed to fix the magnitude of the light vector meson contribution to g 1 , using the Recent measurements in the region of baryonic resonances. The DHGHY moment function is calculated. Predictions are compared to the data. (author)

  19. Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective

    OpenAIRE

    Shuo Gu; Jianfeng Pei

    2017-01-01

    With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regula...

  20. Computer Networking Strategies for Building Collaboration among Science Educators.

    Science.gov (United States)

    Aust, Ronald

    The development and dissemination of science materials can be associated with technical delivery systems such as the Unified Network for Informatics in Teacher Education (UNITE). The UNITE project was designed to investigate ways for using computer networking to improve communications and collaboration among university schools of education and…

  1. Neural network evaluation of tokamak current profiles for real time control (abstract)

    International Nuclear Information System (INIS)

    Wroblewski, D.

    1997-01-01

    Active feedback control of the current profile, requiring real-time determination of the current profile parameters, is envisioned for tokamaks operating in enhanced confinement regimes. The distribution of toroidal current in a tokamak is now routinely evaluated based on external (magnetic probes, flux loops) and internal (motional Stark effect) measurements of the poloidal magnetic field. However, the analysis involves reconstruction of magnetohydrodynamic equilibrium and is too intensive computationally to be performed in real time. In the present study, a neural network is used to provide a mapping from the magnetic measurements (internal and external) to selected parameters of the safety factor profile. The single-pass, feedforward calculation of output of a trained neural network is very fast, making this approach particularly suitable for real-time applications. The network was trained on a large set of simulated equilibrium data for the DIII-D tokamak. The database encompasses a large variety of current profiles including the hollow current profiles important for reversed central shear operation. The parameters of safety factor profile (a quantity related to the current profile through the magnetic field tilt angle) estimated by the neural network include central safety factor, q 0 , minimum value of q, q min , and the location of q min . Very good performance of the trained neural network both for simulated test data and for experimental data is demonstrated. copyright 1997 American Institute of Physics

  2. Status report on the USGS component of the Global Seismographic Network

    Science.gov (United States)

    Gee, L. S.; Bolton, H. F.; Derr, J.; Ford, D.; Gyure, G.; Hutt, C. R.; Ringler, A.; Storm, T.; Wilson, D.

    2010-12-01

    As recently as four years ago, the average age of a datalogger in the portion of the Global Seismographic Network (GSN) operated by the United States Geological Survey (USGS) was 16 years - an eternity in the lifetime of computers. The selection of the Q330HR in 2006 as the “next generation” datalogger by an Incorporated Research Institutions for Seismology (IRIS) selection committee opened the door for upgrading the GSN. As part of the “next generation” upgrades, the USGS is replacing a single Q680 system with two Q330HRs and a field processor to provide the same capability. The functionality includes digitizing, timing, event detection, conversion into miniSEED records, archival of miniSEED data on the ASP and telemetry of the miniSEED data using International Deployment of Accelerometers (IDA) Authenticated Disk Protocol (IACP). At many sites, Quanterra Balers are also being deployed. The Q330HRs feature very low power consumption (which will increase reliability) and higher resolution than the Q680 systems. Furthermore, this network-wide upgrade provides the opportunity to correct known station problems, standardize the installation of secondary sensors and accelerometers, replace the feedback electronics of STS-1 sensors, and perform checks of absolute system sensitivity and sensor orientation. The USGS upgrades began with ANMO in May, 2008. Although we deployed Q330s at KNTN and WAKE in the fall of 2007 (and in the installation of the Caribbean network), these deployments did not include the final software configuration for the GSN upgrades. Following this start, the USGS installed six additional sites in FY08. With funding from the American Recovery and Reinvestment Act and the USGS GSN program, 14 stations were upgraded in FY09. Twenty-one stations are expected to be upgraded in FY10. These systematic network-wide upgrades will improve the reliability and data quality of the GSN, with the end goal of providing the Earth science community high

  3. Wave-equation Q tomography

    KAUST Repository

    Dutta, Gaurav

    2016-10-12

    Strong subsurface attenuation leads to distortion of amplitudes and phases of seismic waves propagating inside the earth. The amplitude and the dispersion losses from attenuation are often compensated for during prestack depth migration. However, most attenuation compensation or Qcompensation migration algorithms require an estimate of the background Q model. We have developed a wave-equation gradient optimization method that inverts for the subsurface Q distribution by minimizing a skeletonized misfit function ∈, where ∈ is the sum of the squared differences between the observed and the predicted peak/centroid-frequency shifts of the early arrivals. The gradient is computed by migrating the observed traces weighted by the frequency shift residuals. The background Q model is perturbed until the predicted and the observed traces have the same peak frequencies or the same centroid frequencies. Numerical tests determined that an improved accuracy of the Q model by wave-equation Q tomography leads to a noticeable improvement in migration image quality. © 2016 Society of Exploration Geophysicists.

  4. Wave-equation Q tomography

    KAUST Repository

    Dutta, Gaurav; Schuster, Gerard T.

    2016-01-01

    Strong subsurface attenuation leads to distortion of amplitudes and phases of seismic waves propagating inside the earth. The amplitude and the dispersion losses from attenuation are often compensated for during prestack depth migration. However, most attenuation compensation or Qcompensation migration algorithms require an estimate of the background Q model. We have developed a wave-equation gradient optimization method that inverts for the subsurface Q distribution by minimizing a skeletonized misfit function ∈, where ∈ is the sum of the squared differences between the observed and the predicted peak/centroid-frequency shifts of the early arrivals. The gradient is computed by migrating the observed traces weighted by the frequency shift residuals. The background Q model is perturbed until the predicted and the observed traces have the same peak frequencies or the same centroid frequencies. Numerical tests determined that an improved accuracy of the Q model by wave-equation Q tomography leads to a noticeable improvement in migration image quality. © 2016 Society of Exploration Geophysicists.

  5. Development and application of computer network for working out of researches on high energy physics

    International Nuclear Information System (INIS)

    Boos, Eh.G.; Tashimov, M.A.

    2001-01-01

    Computer network of the Physical and Technological Institute of the Ministry and Science and Education of the Republic of Kazakhstan (FTI of MSE RK) jointing a number of the research institutions, leading universities and other enterprises of Almaty city. At the present time more than 350 computers are connected to this network, the velocity of satellite channel is increased up to 192 k bit/s per one reception. The university segments of the network are separated in individual domen. A new software for analysis and proceeding of experimental data are implemented and other measures are carried out as well. However an increasing volume of information exchange between nuclear-physical center demanding the further information network development. So for providing consumers demands in information exchange in the nearest years in the paper the possibility for following measures maintenance are considered: (1) Increase of satellite channel velocity up to 1-2 M bit/s by replace of the existing SDM-100 modem on a rapid one. Now using the Kedr-M station and the CISCO-2501 tracer allowing to provide such velocity; (2) Convert of the Institute local calculation network on the new Fast Ethernet technology permitting to increase the information transmission velocity up to 100 M bit/s at the complete succession of existing Ethernet; (3) The Proxy-server (Firewaal) install at the network support assay, that giving the possibility for discharging of satellite channel and localization of segment of the network, connected with learning on the Internet not in damage to educational process. In the framework of cooperation with DESY German accelerating center with help of the indicated network the data about 2 hundred thousand deep inelastic interactions of electrons with protons measured at ZEUS detector are obtained. Data about 10 thousand of events simulated at the OPAL installation are received as well. Besides the computer network is using for operative information exchange and

  6. An Efficient Algorithm for Computing Attractors of Synchronous And Asynchronous Boolean Networks

    Science.gov (United States)

    Zheng, Desheng; Yang, Guowu; Li, Xiaoyu; Wang, Zhicai; Liu, Feng; He, Lei

    2013-01-01

    Biological networks, such as genetic regulatory networks, often contain positive and negative feedback loops that settle down to dynamically stable patterns. Identifying these patterns, the so-called attractors, can provide important insights for biologists to understand the molecular mechanisms underlying many coordinated cellular processes such as cellular division, differentiation, and homeostasis. Both synchronous and asynchronous Boolean networks have been used to simulate genetic regulatory networks and identify their attractors. The common methods of computing attractors are that start with a randomly selected initial state and finish with exhaustive search of the state space of a network. However, the time complexity of these methods grows exponentially with respect to the number and length of attractors. Here, we build two algorithms to achieve the computation of attractors in synchronous and asynchronous Boolean networks. For the synchronous scenario, combing with iterative methods and reduced order binary decision diagrams (ROBDD), we propose an improved algorithm to compute attractors. For another algorithm, the attractors of synchronous Boolean networks are utilized in asynchronous Boolean translation functions to derive attractors of asynchronous scenario. The proposed algorithms are implemented in a procedure called geneFAtt. Compared to existing tools such as genYsis, geneFAtt is significantly faster in computing attractors for empirical experimental systems. Availability The software package is available at https://sites.google.com/site/desheng619/download. PMID:23585840

  7. Computational Analysis of Molecular Interaction Networks Underlying Change of HIV-1 Resistance to Selected Reverse Transcriptase Inhibitors.

    Science.gov (United States)

    Kierczak, Marcin; Dramiński, Michał; Koronacki, Jacek; Komorowski, Jan

    2010-12-12

    Despite more than two decades of research, HIV resistance to drugs remains a serious obstacle in developing efficient AIDS treatments. Several computational methods have been developed to predict resistance level from the sequence of viral proteins such as reverse transcriptase (RT) or protease. These methods, while powerful and accurate, give very little insight into the molecular interactions that underly acquisition of drug resistance/hypersusceptibility. Here, we attempt at filling this gap by using our Monte Carlo feature selection and interdependency discovery method (MCFS-ID) to elucidate molecular interaction networks that characterize viral strains with altered drug resistance levels. We analyzed a number of HIV-1 RT sequences annotated with drug resistance level using the MCFS-ID method. This let us expound interdependency networks that characterize change of drug resistance to six selected RT inhibitors: Abacavir, Lamivudine, Stavudine, Zidovudine, Tenofovir and Nevirapine. The networks consider interdependencies at the level of physicochemical properties of mutating amino acids, eg,: polarity. We mapped each network on the 3D structure of RT in attempt to understand the molecular meaning of interacting pairs. The discovered interactions describe several known drug resistance mechanisms and, importantly, some previously unidentified ones. Our approach can be easily applied to a whole range of problems from the domain of protein engineering. A portable Java implementation of our MCFS-ID method is freely available for academic users and can be obtained at: http://www.ipipan.eu/staff/m.draminski/software.htm.

  8. DirQ: A Directed Query Dissemination Scheme for Wireless Sensor Networks

    NARCIS (Netherlands)

    Chatterjea, Supriyo; De Luigi, Simone; Havinga, Paul J.M.; Kaminska, B

    This paper describes a Directed Query Dissemination Scheme, DirQ that routes queries to the appropriate source nodes based on both constant and dynamic-valued attributes such as sensor types and sensor values. Location information is not essential for the operation of DirQ. DirQ only uses locally

  9. 17 CFR 270.30a-2 - Certification of Form N-CSR and Form N-Q.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Certification of Form N-CSR... Form N-CSR and Form N-Q. (a) Each report filed on Form N-CSR (§§ 249.331 and 274.128 of this chapter) or Form N-Q (§§ 249.332 and 274.130 of this chapter) by a registered management investment company...

  10. Student Motivation in Computer Networking Courses

    Directory of Open Access Journals (Sweden)

    Wen-Jung Hsin

    2007-01-01

    Full Text Available This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners’ daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct, self-motivation.

  11. HLA-DRB1*03:01 and HLA-DRB1*04:01 modify the presentation and outcome in autoimmune hepatitis type-1.

    Science.gov (United States)

    van Gerven, N M F; de Boer, Y S; Zwiers, A; Verwer, B J; Drenth, J P H; van Hoek, B; van Erpecum, K J; Beuers, U; van Buuren, H R; den Ouden, J W; Verdonk, R C; Koek, G H; Brouwer, J T; Guichelaar, M M J; Vrolijk, J M; Coenraad, M J; Kraal, G; Mulder, C J J; van Nieuwkerk, C M J; Bloemena, E; Verspaget, H W; Kumar, V; Zhernakova, A; Wijmenga, C; Franke, L; Bouma, G

    2015-06-01

    The classical human leukocyte antigen (HLA)-DRB1*03:01 and HLA-DRB1*04:01 alleles are established autoimmune hepatitis (AIH) risk alleles. To study the immune-modifying effect of these alleles, we imputed the genotypes from genome-wide association data in 649 Dutch AIH type-1 patients. We therefore compared the international AIH group (IAIHG) diagnostic scores as well as the underlying clinical characteristics between patients positive and negative for these HLA alleles. Seventy-five percent of the AIH patients were HLA-DRB1*03:01/HLA-DRB1*04:01 positive. HLA-DRB1*03:01/HLA-DRB1*04:01-positive patients had a higher median IAIHG score than HLA-DRB1*03:01/HLA-DRB1*04:01-negative patients (P<0.001). We did not observe associations between HLA alleles and alanine transaminase levels (HLA-DRB1*03:01: P=0.2; HLA-DRB1*04:01; P=0.5); however, HLA-DRB1*03:01 was independently associated with higher immunoglobulin G levels (P=0.04). The HLA-DRB1*04:01 allele was independently associated with presentation at older age (P=0.03) and a female predominance (P=0.04). HLA-DRB1*03:01-positive patients received immunosuppressive medication and liver transplantation. In conclusion, the HLA-DRB1*03:01 and HLA-DRB1*04:01 alleles are both independently associated with the aggregate diagnostic IAIHG score in type-1 AIH patients, but are not essential for AIH development. HLA-DRB1*03:01 is the strongest genetic modifier of disease severity in AIH.

  12. Tricriticality in the q-neighbor Ising model on a partially duplex clique.

    Science.gov (United States)

    Chmiel, Anna; Sienkiewicz, Julian; Sznajd-Weron, Katarzyna

    2017-12-01

    We analyze a modified kinetic Ising model, a so-called q-neighbor Ising model, with Metropolis dynamics [Phys. Rev. E 92, 052105 (2015)PLEEE81539-375510.1103/PhysRevE.92.052105] on a duplex clique and a partially duplex clique. In the q-neighbor Ising model each spin interacts only with q spins randomly chosen from its whole neighborhood. In the case of a duplex clique the change of a spin is allowed only if both levels simultaneously induce this change. Due to the mean-field-like nature of the model we are able to derive the analytic form of transition probabilities and solve the corresponding master equation. The existence of the second level changes dramatically the character of the phase transition. In the case of the monoplex clique, the q-neighbor Ising model exhibits a continuous phase transition for q=3, discontinuous phase transition for q≥4, and for q=1 and q=2 the phase transition is not observed. On the other hand, in the case of the duplex clique continuous phase transitions are observed for all values of q, even for q=1 and q=2. Subsequently we introduce a partially duplex clique, parametrized by r∈[0,1], which allows us to tune the network from monoplex (r=0) to duplex (r=1). Such a generalized topology, in which a fraction r of all nodes appear on both levels, allows us to obtain the critical value of r=r^{*}(q) at which a tricriticality (switch from continuous to discontinuous phase transition) appears.

  13. A microplate adaptation of the solid-phase C1q immune complex assay

    International Nuclear Information System (INIS)

    Hunt, J.S.; Kennedy, M.P.; Barber, K.E.; McGiven, A.R.

    1980-01-01

    A method has been developed for the detection of C1q binding immune complexes in serum in which microculture plates are used as the solid-phase matrix for adsorption of C1q. This micromethod used only one-tenth of the amount of both C1q and [ 125 I]antihuman immunoglobulin per test and enabled 7 times as many samples to be tested in triplicate in comparison with the number performed in duplicate by the standard tube assay. (Auth.)

  14. Discrete opinion dynamics on networks based on social influence

    Energy Technology Data Exchange (ETDEWEB)

    Hu Haibo; Wang Xiaofan [Complex Networks and Control Lab, Shanghai Jiao Tong University, Shanghai 200240 (China)

    2009-06-05

    A model of opinion dynamics based on social influence on networks was studied. The opinion of each agent can have integer values i = 1, 2, ..., I and opinion exchanges are restricted to connected agents. It was found that for any I {>=} 2 and self-confidence parameter 0 {<=} u < 1, when u is a degree-independent constant, the weighted proportion (q{sub i}) of the population that hold a given opinion i is a martingale, and the fraction q{sub i} of opinion i will gradually converge to (q{sub i}). The tendency can slow down with the increase of degree assortativity of networks. When u is degree dependent, (q{sub i}) does not possess the martingale property, however q{sub i} still converges to it. In both cases for a finite network the states of all agents will finally reach consensus. Further if there exist stubborn persons in the population whose opinions do not change over time, it was found that for degree-independent constant u, both q{sub i} and (q{sub i}) will converge to fixed proportions which only depend on the distribution of initial obstinate persons, and naturally the final equilibrium state will be the coexistence of diverse opinions held by the stubborn people. The analytical results were verified by numerical simulations on Barabasi-Albert (BA) networks. The model highlights the influence of high-degree agents on the final consensus or coexistence state and captures some realistic features of the diffusion of opinions in social networks.

  15. Analysis of healthy cohorts for single nucleotide polymorphisms in C1q gene cluster

    Directory of Open Access Journals (Sweden)

    MARIA A. RADANOVA

    2015-12-01

    Full Text Available C1q is the first component of the classical pathway of complement activation. The coding region for C1q is localized on chromosome 1p34.1–36.3. Mutations or single nucleotide polymorphisms (SNPs in C1q gene cluster can cause developing of Systemic lupus erythematosus (SLE because of C1q deficiency or other unknown reason. We selected five SNPs located in 7.121 kbp region on chromosome 1, which were previously associated with SLE and/or low C1q level, but not causing C1q deficiency and analyzed them in terms of allele frequencies and genotype distribution in comparison with Hispanic, Asian, African and other Caucasian cohorts. These SNPs were: rs587585, rs292001, rs172378, rs294179 and rs631090. One hundred eighty five healthy Bulgarian volunteers were genotyped for the selected five C1q SNPs by quantative real-time PCR methods. International HapMap Project has been used for information about genotype distribution and allele frequencies of the five SNPs in, Hispanics, Asians, Africans and others Caucasian cohorts. Bulgarian healthy volunteers and another pooled Caucasian cohort had similar frequencies of genotypes and alleles of rs587585, rs292001, rs294179 and rs631090 SNPs. Nevertheless, genotype AA of rs172378 was significantly overrepresented in Bulgarians when compared to other healthy Caucasians from USA and UK (60% vs 31%. Genotype distribution of rs172378 in Bulgarians was similar to Greek-Cyriot Caucasians. For all Caucasians the major allele of rs172378 was A. This is the first study analyzing the allele frequencies and genotype distribution of C1q gene cluster SNPs in Bulgarian healthy population.

  16. Algorithm-structured computer arrays and networks architectures and processes for images, percepts, models, information

    CERN Document Server

    Uhr, Leonard

    1984-01-01

    Computer Science and Applied Mathematics: Algorithm-Structured Computer Arrays and Networks: Architectures and Processes for Images, Percepts, Models, Information examines the parallel-array, pipeline, and other network multi-computers.This book describes and explores arrays and networks, those built, being designed, or proposed. The problems of developing higher-level languages for systems and designing algorithm, program, data flow, and computer structure are also discussed. This text likewise describes several sequences of successively more general attempts to combine the power of arrays wi

  17. Review On Applications Of Neural Network To Computer Vision

    Science.gov (United States)

    Li, Wei; Nasrabadi, Nasser M.

    1989-03-01

    Neural network models have many potential applications to computer vision due to their parallel structures, learnability, implicit representation of domain knowledge, fault tolerance, and ability of handling statistical data. This paper demonstrates the basic principles, typical models and their applications in this field. Variety of neural models, such as associative memory, multilayer back-propagation perceptron, self-stabilized adaptive resonance network, hierarchical structured neocognitron, high order correlator, network with gating control and other models, can be applied to visual signal recognition, reinforcement, recall, stereo vision, motion, object tracking and other vision processes. Most of the algorithms have been simulated on com-puters. Some have been implemented with special hardware. Some systems use features, such as edges and profiles, of images as the data form for input. Other systems use raw data as input signals to the networks. We will present some novel ideas contained in these approaches and provide a comparison of these methods. Some unsolved problems are mentioned, such as extracting the intrinsic properties of the input information, integrating those low level functions to a high-level cognitive system, achieving invariances and other problems. Perspectives of applications of some human vision models and neural network models are analyzed.

  18. Distributed computing methodology for training neural networks in an image-guided diagnostic application.

    Science.gov (United States)

    Plagianakos, V P; Magoulas, G D; Vrahatis, M N

    2006-03-01

    Distributed computing is a process through which a set of computers connected by a network is used collectively to solve a single problem. In this paper, we propose a distributed computing methodology for training neural networks for the detection of lesions in colonoscopy. Our approach is based on partitioning the training set across multiple processors using a parallel virtual machine. In this way, interconnected computers of varied architectures can be used for the distributed evaluation of the error function and gradient values, and, thus, training neural networks utilizing various learning methods. The proposed methodology has large granularity and low synchronization, and has been implemented and tested. Our results indicate that the parallel virtual machine implementation of the training algorithms developed leads to considerable speedup, especially when large network architectures and training sets are used.

  19. Computing spin networks

    International Nuclear Information System (INIS)

    Marzuoli, Annalisa; Rasetti, Mario

    2005-01-01

    We expand a set of notions recently introduced providing the general setting for a universal representation of the quantum structure on which quantum information stands. The dynamical evolution process associated with generic quantum information manipulation is based on the (re)coupling theory of SU (2) angular momenta. Such scheme automatically incorporates all the essential features that make quantum information encoding much more efficient than classical: it is fully discrete; it deals with inherently entangled states, naturally endowed with a tensor product structure; it allows for generic encoding patterns. The model proposed can be thought of as the non-Boolean generalization of the quantum circuit model, with unitary gates expressed in terms of 3nj coefficients connecting inequivalent binary coupling schemes of n + 1 angular momentum variables, as well as Wigner rotations in the eigenspace of the total angular momentum. A crucial role is played by elementary j-gates (6j symbols) which satisfy algebraic identities that make the structure of the model similar to 'state sum models' employed in discretizing topological quantum field theories and quantum gravity. The spin network simulator can thus be viewed also as a Combinatorial QFT model for computation. The semiclassical limit (large j) is discussed

  20. A 250-Mbit/s ring local computer network using 1.3-microns single-mode optical fibers

    Science.gov (United States)

    Eng, S. T.; Tell, R.; Andersson, T.; Eng, B.

    1985-01-01

    A 250-Mbit/s three-station fiber-optic ring local computer network was built and successfully demonstrated. A conventional token protocol was employed for bus arbitration to maximize the bus efficiency under high loading conditions, and a non-return-to-zero (NRS) data encoding format was selected for simplicity and maximum utilization of the ECL-circuit bandwidth.

  1. The challenge of networked enterprises for cloud computing interoperability

    OpenAIRE

    Mezgár, István; Rauschecker, Ursula

    2014-01-01

    Manufacturing enterprises have to organize themselves into effective system architectures forming different types of Networked Enterprises (NE) to match fast changing market demands. Cloud Computing (CC) is an important up to date computing concept for NE, as it offers significant financial and technical advantages beside high-level collaboration possibilities. As cloud computing is a new concept the solutions for handling interoperability, portability, security, privacy and standardization c...

  2. Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment.

    Science.gov (United States)

    Lee, Wei-Po; Hsiao, Yu-Ting; Hwang, Wei-Che

    2014-01-16

    To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high

  3. Distributed Problem Solving: Adaptive Networks with a Computer Intermediary Resource. Intelligent Executive Computer Communication

    Science.gov (United States)

    1991-06-01

    Proceedings of The National Conference on Artificial Intelligence , pages 181-184, The American Association for Aritificial Intelligence , Pittsburgh...Intermediary Resource: Intelligent Executive Computer Communication John Lyman and Carla J. Conaway University of California at Los Angeles for Contracting...Include Security Classification) Interim Report: Distributed Problem Solving: Adaptive Networks With a Computer Intermediary Resource: Intelligent

  4. Locating hardware faults in a data communications network of a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-01-12

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  5. Identification of novel candidate target genes, including EPHB3, MASP1 and SST at 3q26.2–q29 in squamous cell carcinoma of the lung

    International Nuclear Information System (INIS)

    Kang, Ji Un; Koo, Sun Hoe; Kwon, Kye Chul; Park, Jong Woo; Kim, Jin Man

    2009-01-01

    The underlying genetic alterations for squamous cell carcinoma (SCC) and adenocarcinoma (AC) carcinogenesis are largely unknown. High-resolution array- CGH was performed to identify the differences in the patterns of genomic imbalances between SCC and AC of non-small cell lung cancer (NSCLC). On a genome-wide profile, SCCs showed higher frequency of gains than ACs (p = 0.067). More specifically, statistically significant differences were observed across the histologic subtypes for gains at 2q14.2, 3q26.2–q29, 12p13.2–p13.33, and 19p13.3, as well as losses at 3p26.2–p26.3, 16p13.11, and 17p11.2 in SCC, and gains at 7q22.1 and losses at 15q22.2–q25.2 occurred in AC (P < 0.05). The most striking difference between SCC and AC was gains at the 3q26.2–q29, occurring in 86% (19/22) of SCCs, but in only 21% (3/14) of ACs. Many significant genes at the 3q26.2–q29 regions previously linked to a specific histology, such as EVI1,MDS1, PIK3CA and TP73L, were observed in SCC (P < 0.05). In addition, we identified the following possible target genes (> 30% of patients) at 3q26.2–q29: LOC389174 (3q26.2),KCNMB3 (3q26.32),EPHB3 (3q27.1), MASP1 and SST (3q27.3), LPP and FGF12 (3q28), and OPA1,KIAA022,LOC220729, LOC440996,LOC440997, and LOC440998 (3q29), all of which were significantly targeted in SCC (P < 0.05). Among these same genes, high-level amplifications were detected for the gene, EPHB3, at 3q27.1, and MASP1 and SST, at 3q27.3 (18, 18, and 14%, respectively). Quantitative real time PCR demonstrated array CGH detected potential candidate genes that were over expressed in SCCs. Using whole-genome array CGH, we have successfully identified significant differences and unique information of chromosomal signatures prevalent between the SCC and AC subtypes of NSCLC. The newly identified candidate target genes may prove to be highly attractive candidate molecular markers for the classification of NSCLC histologic subtypes, and could potentially contribute to the

  6. A complex network approach to cloud computing

    International Nuclear Information System (INIS)

    Travieso, Gonzalo; Ruggiero, Carlos Antônio; Bruno, Odemir Martinez; Costa, Luciano da Fontoura

    2016-01-01

    Cloud computing has become an important means to speed up computing. One problem influencing heavily the performance of such systems is the choice of nodes as servers responsible for executing the clients’ tasks. In this article we report how complex networks can be used to model such a problem. More specifically, we investigate the performance of the processing respectively to cloud systems underlaid by Erdős–Rényi (ER) and Barabási-Albert (BA) topology containing two servers. Cloud networks involving two communities not necessarily of the same size are also considered in our analysis. The performance of each configuration is quantified in terms of the cost of communication between the client and the nearest server, and the balance of the distribution of tasks between the two servers. Regarding the latter, the ER topology provides better performance than the BA for smaller average degrees and opposite behaviour for larger average degrees. With respect to cost, smaller values are found in the BA topology irrespective of the average degree. In addition, we also verified that it is easier to find good servers in ER than in BA networks. Surprisingly, balance and cost are not too much affected by the presence of communities. However, for a well-defined community network, we found that it is important to assign each server to a different community so as to achieve better performance. (paper: interdisciplinary statistical mechanics )

  7. q-Gamow states as continuous linear functionals on analytical test functions

    Energy Technology Data Exchange (ETDEWEB)

    Plastino, A.; Rocca, M.C., E-mail: mariocarlosrocca@gmail.com

    2016-04-15

    We define here q-Gamow states corresponding to Tsallis' q-statistics. We compute for them their norm, mean energy value and the q-analogue of the Breit–Wigner distribution (a q-Breit–Wigner).

  8. A t(3;9)(q25.1;q34.3) translocation leading to OLFM1 fusion transcripts in Gilles de la Tourette syndrome, OCD and ADHD

    DEFF Research Database (Denmark)

    Bertelsen, Birgitte; Melchior, Linea; Jensen, Lars Riff

    2015-01-01

    Gilles de la Tourette syndrome (GTS) is a neuropsychiatric disorder with a strong genetic etiology; however, finding of candidate genes is hampered by its genetic heterogeneity and the influence of non-genetic factors on disease pathogenesis. We report a case of a male patient with GTS, obsessive...... compulsive disorder, attention-deficit/hyperactivity-disorder, as well as other comorbidities, and a translocation t(3;9)(q25.1;q34.3) inherited from a mother with tics. Mate-pair sequencing revealed that the translocation breakpoints truncated the olfactomedin 1 (OLFM1) gene and two uncharacterized...

  9. Molecular genetic characterization of a prenatally detected de novo interstitial deletion of chromosome 2q (2q31.1-q32.1 encompassing HOXD13, ZNF385B and ZNF804A associated with syndactyly and increased first-trimester nuchal translucency

    Directory of Open Access Journals (Sweden)

    Chih-Ping Chen

    2017-06-01

    Conclusion: Fetuses with an interstitial deletion of 2q31.1-q32.1 may be associated with increased first-trimester NT. Haploinsufficiency of HOXD13 is associated with syndactyly. Genomic microarray is useful in detecting subtle chromosomal abnormalities in fetuses with increased NT and normal karyotype.

  10. Educational Technology Network: a computer conferencing system dedicated to applications of computers in radiology practice, research, and education.

    Science.gov (United States)

    D'Alessandro, M P; Ackerman, M J; Sparks, S M

    1993-11-01

    Educational Technology Network (ET Net) is a free, easy to use, on-line computer conferencing system organized and funded by the National Library of Medicine that is accessible via the SprintNet (SprintNet, Reston, VA) and Internet (Merit, Ann Arbor, MI) computer networks. It is dedicated to helping bring together, in a single continuously running electronic forum, developers and users of computer applications in the health sciences, including radiology. ET Net uses the Caucus computer conferencing software (Camber-Roth, Troy, NY) running on a microcomputer. This microcomputer is located in the National Library of Medicine's Lister Hill National Center for Biomedical Communications and is directly connected to the SprintNet and the Internet networks. The advanced computer conferencing software of ET Net allows individuals who are separated in space and time to unite electronically to participate, at any time, in interactive discussions on applications of computers in radiology. A computer conferencing system such as ET Net allows radiologists to maintain contact with colleagues on a regular basis when they are not physically together. Topics of discussion on ET Net encompass all applications of computers in radiological practice, research, and education. ET Net has been in successful operation for 3 years and has a promising future aiding radiologists in the exchange of information pertaining to applications of computers in radiology.

  11. Classification and Analysis of Computer Network Traffic

    DEFF Research Database (Denmark)

    Bujlow, Tomasz

    2014-01-01

    various classification modes (decision trees, rulesets, boosting, softening thresholds) regarding the classification accuracy and the time required to create the classifier. We showed how to use our VBS tool to obtain per-flow, per-application, and per-content statistics of traffic in computer networks...

  12. Computational Modeling of Complex Protein Activity Networks

    NARCIS (Netherlands)

    Schivo, Stefano; Leijten, Jeroen; Karperien, Marcel; Post, Janine N.; Prignet, Claude

    2017-01-01

    Because of the numerous entities interacting, the complexity of the networks that regulate cell fate makes it impossible to analyze and understand them using the human brain alone. Computational modeling is a powerful method to unravel complex systems. We recently described the development of a

  13. Characterization of the honeybee venom proteins C1q-like protein and PVF1 and their allergenic potential

    DEFF Research Database (Denmark)

    Russkamp, Dennis; Van Vaerenbergh, Matthias; Etzold, Stefanie

    2018-01-01

    -like protein (C1q) and PDGF/VEGF-like factor 1 (PVF1). C1q and PVF1 were produced as recombinant proteins in insect cells. Their allergenic properties were examined by determining the level of specific IgE antibodies in the sera of HBV-allergic patients (n = 26) as well as by their capacity to activate...... frugiperda insect cells exhibited specific IgE reactivity with approximately 38.5% of sera of HBV-allergic patients. Interestingly, both proteins were unable to activate basophils of the patients, questioning their role in the context of clinically relevant sensitization. Recombinant C1q and PVF1 can build...

  14. Evaluation of potential regulatory function of breast cancer risk locus at 6q25.1.

    Science.gov (United States)

    Sun, Yaqiong; Ye, Chuanzhong; Guo, Xingyi; Wen, Wanqing; Long, Jirong; Gao, Yu-Tang; Shu, Xiao Ou; Zheng, Wei; Cai, Qiuyin

    2016-02-01

    In a genome-wide association study conducted among Chinese women, we identified the single nucleotide polymorphism (SNP) rs2046210 at 6q25.1 for breast cancer risk. To explore a potential regulatory role for this risk locus, we measured expression levels of nine genes at the locus in breast cancer tissue and adjacent normal tissue samples obtained from 67 patients recruited in the Shanghai Breast Cancer Study. We found that rs2046210 had a statistically significant association with the expression levels of the AKAP12 and ESR1 genes in adjacent normal breast tissues. Women who carry the AA/AG risk genotypes had higher expressions of these two genes compared to those who carry G/G genotypes (P = 0.02 and 0.04 for the AKAP12 and ESR1, respectively). However, no significant differences of SNP rs2046210 with gene expression levels were found in tumor tissues. In The Cancer Genome Atlas samples, the AA/AG risk genotypes of SNP rs2046210 were associated with a significantly higher expression level of the AKAP12 gene and a lower level of the ESR1 gene in tumor tissue. Functional analysis using ENCODE data revealed that SNP rs7763637, which is in strong linkage disequilibrium with SNP rs2046210, is likely a potential functional variant, regulating the AKAP12 gene. Taken together, these results from our study suggest that the association between the 6q25.1 locus and breast cancer risk may be mediated through SNPs that regulate expressions of the AKAP12 gene. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Engineering Assessment and Certification of Integrity of the 490-Q1 tank system

    Energy Technology Data Exchange (ETDEWEB)

    Schwartz, W.W. [Lawrence Livermore National Lab., CA (United States); Gee, C.W.; Graser, D.A. [Science Applications International Corp., San Diego, CA (US)

    1993-07-01

    This Engineering Assessment and Certification of Integrity of used freon storage tanks 490-Q1A1 and 490-Q1A2 has been prepared in response to 40 CFR 265.192(a) and 22 CCR 66265.192(a) for new tank systems that store hazardous waste and have secondary containment. The regulations require that this assessment be completed and certified by an independent, qualified, California-registered professional engineer before the tank system is placed in use as a hazardous waste storage tank system. The technical assessments for the 490-Q1A1 and 490-Q1A2 tank systems have been reviewed by an independent, qualified, California-registered professional engineer, who has certified that the tank systems have sufficient structural integrity, are acceptable for transferring and storing hazardous waste, are compatible with the stored waste, and the tanks and containment system are suitably designed to achieve the requirements of the applicable regulations so they will not collapse, rupture, or fail.

  16. Advanced Scientific Computing Research Network Requirements: ASCR Network Requirements Review Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Bacon, Charles [Argonne National Lab. (ANL), Argonne, IL (United States); Bell, Greg [ESnet, Berkeley, CA (United States); Canon, Shane [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Dart, Eli [ESnet, Berkeley, CA (United States); Dattoria, Vince [Dept. of Energy (DOE), Washington DC (United States). Office of Science. Advanced Scientific Computing Research (ASCR); Goodwin, Dave [Dept. of Energy (DOE), Washington DC (United States). Office of Science. Advanced Scientific Computing Research (ASCR); Lee, Jason [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hicks, Susan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Holohan, Ed [Argonne National Lab. (ANL), Argonne, IL (United States); Klasky, Scott [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Lauzon, Carolyn [Dept. of Energy (DOE), Washington DC (United States). Office of Science. Advanced Scientific Computing Research (ASCR); Rogers, Jim [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Shipman, Galen [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Skinner, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Tierney, Brian [ESnet, Berkeley, CA (United States)

    2013-03-08

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 25 years. In October 2012, ESnet and the Office of Advanced Scientific Computing Research (ASCR) of the DOE SC organized a review to characterize the networking requirements of the programs funded by the ASCR program office. The requirements identified at the review are summarized in the Findings section, and are described in more detail in the body of the report.

  17. A Pst I polymorphism in the human laminin B2 chain gene on 1q25-q31

    Energy Technology Data Exchange (ETDEWEB)

    Kallunki, T; Pikkarainen, T; Tryggvason, K; Savolainen, E R [Univ. of Oulu (Finland)

    1989-06-12

    pHL-210 is a 2.7 kb cDNA insert in pBR322 that codes for the central position of the 7.5 kb mRNA. A Pst I polymorphism was identified with pHL-210. The allele frequency was studied in 40 chromosomes of unrelated Finnish individuals. The probe was localized to chromosome 1q25-q31 by somatic cell and in situ hybridization. Co-dominant inheritance was shown in three families.

  18. Hybrid computing using a neural network with dynamic external memory.

    Science.gov (United States)

    Graves, Alex; Wayne, Greg; Reynolds, Malcolm; Harley, Tim; Danihelka, Ivo; Grabska-Barwińska, Agnieszka; Colmenarejo, Sergio Gómez; Grefenstette, Edward; Ramalho, Tiago; Agapiou, John; Badia, Adrià Puigdomènech; Hermann, Karl Moritz; Zwols, Yori; Ostrovski, Georg; Cain, Adam; King, Helen; Summerfield, Christopher; Blunsom, Phil; Kavukcuoglu, Koray; Hassabis, Demis

    2016-10-27

    Artificial neural networks are remarkably adept at sensory processing, sequence learning and reinforcement learning, but are limited in their ability to represent variables and data structures and to store data over long timescales, owing to the lack of an external memory. Here we introduce a machine learning model called a differentiable neural computer (DNC), which consists of a neural network that can read from and write to an external memory matrix, analogous to the random-access memory in a conventional computer. Like a conventional computer, it can use its memory to represent and manipulate complex data structures, but, like a neural network, it can learn to do so from data. When trained with supervised learning, we demonstrate that a DNC can successfully answer synthetic questions designed to emulate reasoning and inference problems in natural language. We show that it can learn tasks such as finding the shortest path between specified points and inferring the missing links in randomly generated graphs, and then generalize these tasks to specific graphs such as transport networks and family trees. When trained with reinforcement learning, a DNC can complete a moving blocks puzzle in which changing goals are specified by sequences of symbols. Taken together, our results demonstrate that DNCs have the capacity to solve complex, structured tasks that are inaccessible to neural networks without external read-write memory.

  19. The global transmission network of HIV-1.

    Science.gov (United States)

    Wertheim, Joel O; Leigh Brown, Andrew J; Hepler, N Lance; Mehta, Sanjay R; Richman, Douglas D; Smith, Davey M; Kosakovsky Pond, Sergei L

    2014-01-15

    Human immunodeficiency virus type 1 (HIV-1) is pandemic, but its contemporary global transmission network has not been characterized. A better understanding of the properties and dynamics of this network is essential for surveillance, prevention, and eventual eradication of HIV. Here, we apply a simple and computationally efficient network-based approach to all publicly available HIV polymerase sequences in the global database, revealing a contemporary picture of the spread of HIV-1 within and between countries. This approach automatically recovered well-characterized transmission clusters and extended other clusters thought to be contained within a single country across international borders. In addition, previously undescribed transmission clusters were discovered. Together, these clusters represent all known modes of HIV transmission. The extent of international linkage revealed by our comprehensive approach demonstrates the need to consider the global diversity of HIV, even when describing local epidemics. Finally, the speed of this method allows for near-real-time surveillance of the pandemic's progression.

  20. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

    Science.gov (United States)

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D.

    2016-01-01

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. PMID:27463718

  1. High Energy Physics Computer Networking: Report of the HEPNET Review Committee

    International Nuclear Information System (INIS)

    1988-06-01

    This paper discusses the computer networks available to high energy physics facilities for transmission of data. Topics covered in this paper are: Existing and planned networks and HEPNET requirements

  2. State of the Art of Network Security Perspectives in Cloud Computing

    Science.gov (United States)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  3. Generalized zeta function representation of groups and 2-dimensional topological Yang-Mills theory: The example of GL(2, _q) and PGL(2, _q)

    International Nuclear Information System (INIS)

    Roche, Ph.

    2016-01-01

    We recall the relation between zeta function representation of groups and two-dimensional topological Yang-Mills theory through Mednikh formula. We prove various generalisations of Mednikh formulas and define generalization of zeta function representations of groups. We compute some of these functions in the case of the finite group GL(2, _q) and PGL(2, _q). We recall the table characters of these groups for any q, compute the Frobenius-Schur indicator of their irreducible representations, and give the explicit structure of their fusion rings.

  4. Factor VII R353Q genetic polymorphism is associated with altered warfarin sensitivity among CYP2C9 *1/*1 carriers.

    Science.gov (United States)

    Mlynarsky, Liat; Bejarano-Achache, Idit; Muszkat, Mordechai; Caraco, Yoseph

    2012-05-01

    Warfarin responsiveness is characterized by marked interindividual variability. A major portion of this variability is attributed to CYP2C9 and VKORC1 polymorphisms, but almost 50% is still unaccounted for. This paper reports the first prospective study on the association between factor VII R353Q polymorphism and warfarin responsiveness during induction. Genotyping for factor VII R353Q and 323D/I polymorphisms was performed in a cohort consisting of 374 patients (198 CYP2C9*1/*1) treated with warfarin who were prospectively followed from warfarin initiation. Compared with *1/*1-R/R and *1/*1-R/Q genotype carriers, *1/*1-Q/Q homozygotes achieved higher International Normalized Ratio (INR) values while consuming lower warfarin doses. The greater sensitivity was illustrated by 82.1% higher Warfarin Sensitivity Index During Induction (WSIDI) (0.14 ± 0.11 vs. 0.08 ± 0.50 mg⁻¹ Mann-Whitney, P = 0.043). Multiple regression analysis consisting of both genetic and nongenetic factors explained 26% of WSIDI variability, with R353Q genetic polymorphism having a modest yet significant effect and accounting for 1.7% of the overall variability. Moreover, the incidence of overanticoagulation (i.e., INR > 4) was 6.94-fold higher among *1/*1-Q/Q vs. *1/*1-R/R&R/Q carriers during warfarin induction (Pearson chi-square, P = 0.005). These findings were not accounted for by a chance difference in the distribution of VKORC1 genotypes. Analysis of these parameters among the entire cohort, including CYP2C9*2 and CYP2C9*3 variant allele carriers, did not reach statistical significance. Warfarin responsiveness during induction was unrelated to factor VII 323D/I genetic polymorphism. The response to warfarin during induction is influenced by factor VII R353Q polymorphism. The prospective use of this polymorphism, along with CYP2C9 and VKORC1, may enhance the accuracy of warfarin loading. However, the impact of R353Q polymorphism on overall warfarin response is subtle, and it is therefore

  5. Chromosomal amplifications, 3q gain and deletions of 2q33-q37 are the frequent genetic changes in cervical carcinoma

    International Nuclear Information System (INIS)

    Rao, Pulivarthi H; Murty, Vundavalli VVS; Arias-Pulido, Hugo; Lu, Xin-Yan; Harris, Charles P; Vargas, Hernan; Zhang, Fang F; Narayan, Gopeshwar; Schneider, Achim; Terry, Mary Beth

    2004-01-01

    Carcinoma of uterine cervix is the second most common cancers among women worldwide. Combined radiation and chemotherapy is the choice of treatment for advanced stages of the disease. The prognosis is poor, with a five-year survival rate ranging from about 20–65%, depending on stage of the disease. Therefore, genetic characterization is essential for understanding the biology and clinical heterogeneity in cervical cancer (CC). We used a genome-wide screening method – comparative genomic hybridization (CGH) to identify DNA copy number changes in 77 patients with cervical cancer. We applied categorical and survival analyses to analyze whether chromosomal changes were related to clinico-pathologic characteristics and patients survival. The CGH analysis revealed a loss of 2q33-q37 (57.1%), gain of 3q (54.5%) and chromosomal amplifications (20.77%) as frequent genetic changes. A total of 15 amplified chromosomal sites were detected in 16 cases that include 1p31, 2q32, 7q22, 8q21.2-q24, 9p22, 10q21, 10q24, 11q13, 11q21, 12q15, 14q12, 17p11.2, 17q22, 18p11.2, and 19q13.1. Recurrent amplified sites were noted at 11q13, 11q21, and 19q13.1. The genomic alterations were further evaluated for prognostic significance in CC patients, and we did not find any correlation with a number of clinical or histological parameters. The tumors harboring HPV18 exhibited higher genomic instability compared to tumors with HPV 16. This study demonstrated that 2q33-q37 deletions, 3q gains and chromosomal amplifications as characteristic changes in invasive CC. These genetic alterations will aid in the identification of novel tumor suppressor gene(s) at 2q33-q37 and oncogenes at amplified chromosomal sites. Molecular characterization of these chromosomal changes utilizing the current genomic technologies will provide new insights into the biology and clinical behavior of CC

  6. Tsallis’ quantum q-fields

    Science.gov (United States)

    Plastino, A.; Rocca, M. C.

    2018-05-01

    We generalize several well known quantum equations to a Tsallis’ q-scenario, and provide a quantum version of some classical fields associated with them in the recent literature. We refer to the q-Schródinger, q-Klein-Gordon, q-Dirac, and q-Proca equations advanced in, respectively, Phys. Rev. Lett. 106, 140601 (2011), EPL 118, 61004 (2017) and references therein. We also introduce here equations corresponding to q-Yang-Mills fields, both in the Abelian and non-Abelian instances. We show how to define the q-quantum field theories corresponding to the above equations, introduce the pertinent actions, and obtain equations of motion via the minimum action principle. These q-fields are meaningful at very high energies (TeV scale) for q = 1.15, high energies (GeV scale) for q = 1.001, and low energies (MeV scale) for q = 1.000001 [Nucl. Phys. A 955 (2016) 16 and references therein]. (See the ALICE experiment at the LHC). Surprisingly enough, these q-fields are simultaneously q-exponential functions of the usual linear fields’ logarithms.

  7. Deletion 1q43 encompassing only CHRM3 in a patient with autistic disorder.

    Science.gov (United States)

    Petersen, Andrea Klunder; Ahmad, Ausaf; Shafiq, Mustafa; Brown-Kipphut, Brigette; Fong, Chin-To; Anwar Iqbal, M

    2013-02-01

    Deletions on the distal portion of the long arm of chromosome 1 result in complex and highly variable clinical phenotypes which include intellectual disability, autism, seizures, microcephaly/craniofacial dysmorphology, corpus callosal agenesis/hypogenesis, cardiac and genital anomalies, hand and foot abnormalities and short stature. Genotype-phenotype correlation reported a minimum region of 2 Mb at 1q43-q44. We report on a 3 ½ year old male patient diagnosed with autistic disorder who has social withdrawal, eating problems, repetitive stereotypic behaviors including self-injurious head banging and hair pulling, and no seizures, anxiety, or mood swings. Array comparative genomic hybridization (aCGH) showed an interstitial deletion of 473 kb at 1q43 region (239,412,391-239,885,394; NCBI build37/hg19) harboring only CHRM3 (Acetylcholine Receptor, Muscarinic, 3; OMIM: 118494). Recently, another case with a de novo interstitial deletion of 911 kb at 1q43 encompassing three genes including CHRM3 was reported. The M3 muscarinic receptor influences a multitude of central and peripheral nervous system processes via its interaction with acetylcholine and may be an important modulator of behavior, learning and memory. We propose CHRM3 as a candidate gene responsible for our patient's specific phenotype as well as the overlapping phenotypic features of other patients with 1q43 or 1q43-q44 deletions. Copyright © 2013. Published by Elsevier Masson SAS.

  8. Atomic switch networks-nanoarchitectonic design of a complex system for natural computing.

    Science.gov (United States)

    Demis, E C; Aguilera, R; Sillin, H O; Scharnhorst, K; Sandouk, E J; Aono, M; Stieg, A Z; Gimzewski, J K

    2015-05-22

    Self-organized complex systems are ubiquitous in nature, and the structural complexity of these natural systems can be used as a model to design new classes of functional nanotechnology based on highly interconnected networks of interacting units. Conventional fabrication methods for electronic computing devices are subject to known scaling limits, confining the diversity of possible architectures. This work explores methods of fabricating a self-organized complex device known as an atomic switch network and discusses its potential utility in computing. Through a merger of top-down and bottom-up techniques guided by mathematical and nanoarchitectonic design principles, we have produced functional devices comprising nanoscale elements whose intrinsic nonlinear dynamics and memorization capabilities produce robust patterns of distributed activity and a capacity for nonlinear transformation of input signals when configured in the appropriate network architecture. Their operational characteristics represent a unique potential for hardware implementation of natural computation, specifically in the area of reservoir computing-a burgeoning field that investigates the computational aptitude of complex biologically inspired systems.

  9. SU-G-IeP3-04: Effective Dose Measurements in Fast Kvp Switch Dual Energy Computed Tomography

    Energy Technology Data Exchange (ETDEWEB)

    Raudabaugh, J; Moore, B [Duke Medical Physics, Duke Radiation Dosimetry Laboratory (United States); Nguyen, G; Yoshizumi, T [Duke Radiology, Duke Radiation Dosimetry Laboratory (United States); Lowry, C; Nelson, R [Duke Radiology (United States)

    2016-06-15

    Purpose: The objective of this study was two-fold: (a) to test a new approach to approximating organ dose by using the effective energy of the combined 80kV/140kV beam in dual-energy (DE) computed tomography (CT), and (b) to derive the effective dose (ED) in the abdomen-pelvis protocol in DECT. Methods: A commercial dual energy CT scanner was employed using a fast-kV switch abdomen/pelvis protocol alternating between 80 kV and 140 kV. MOSFET detectors were used for organ dose measurements. First, an experimental validation of the dose equivalency between MOSFET and ion chamber (as a gold standard) was performed using a CTDI phantom. Second, the ED of DECT scans was measured using MOSFET detectors and an anthropomorphic phantom. For ED calculations, an abdomen/pelvis scan was used using ICRP 103 tissue weighting factors; ED was also computed using the AAPM Dose Length Product (DLP) method and compared to the MOSFET value. Results: The effective energy was determined as 42.9 kV under the combined beam from half-value layer (HVL) measurement. ED for the dual-energy scan was calculated as 16.49 ± 0.04 mSv by the MOSFET method and 14.62 mSv by the DLP method. Conclusion: Tissue dose in the center of the CTDI body phantom was 1.71 ± 0.01 cGy (ion chamber) and 1.71 ± 0.06 (MOSFET) respectively; this validated the use of effective energy method for organ dose estimation. ED from the abdomen-pelvis scan was calculated as 16.49 ± 0.04 mSv by MOSFET and 14.62 mSv by the DLP method; this suggests that the DLP method provides a reasonable approximation to the ED.

  10. Test experience on an ultrareliable computer communication network

    Science.gov (United States)

    Abbott, L. W.

    1984-01-01

    The dispersed sensor processing mesh (DSPM) is an experimental, ultra-reliable, fault-tolerant computer communications network that exhibits an organic-like ability to regenerate itself after suffering damage. The regeneration is accomplished by two routines - grow and repair. This paper discusses the DSPM concept for achieving fault tolerance and provides a brief description of the mechanization of both the experiment and the six-node experimental network. The main topic of this paper is the system performance of the growth algorithm contained in the grow routine. The characteristics imbued to DSPM by the growth algorithm are also discussed. Data from an experimental DSPM network and software simulation of larger DSPM-type networks are used to examine the inherent limitation on growth time by the growth algorithm and the relationship of growth time to network size and topology.

  11. Molecular basis of hereditary C1q deficiency-revisited: identification of several novel disease-causing mutations

    DEFF Research Database (Denmark)

    Schejbel, L; Skattum, L; Hagelberg, S

    2011-01-01

    C1q is the central pattern-recognition molecule in the classical pathway of the complement system and is known to have a key role in the crossroads between adaptive and innate immunity. Hereditary C1q deficiency is a rare genetic condition strongly associated with systemic lupus erythematosus...... and increased susceptibility to bacterial infections. However, the clinical symptoms may vary. For long, the molecular basis of C1q deficiency was ascribed to only six different mutations. In the present report, we describe five new patients with C1q deficiency, present the 12 causative mutations described till...... now and review the clinical spectrum of symptoms found in patients with C1q deficiency. With the results presented here, confirmed C1q deficiency is reported in 64 patients from at least 38 families....

  12. Qq(Q-bar)(q-bar)' states in chiral SU(3) quark model

    International Nuclear Information System (INIS)

    Zhang Haixia; Zhang Min; Zhang Zongye

    2007-01-01

    We study the masses of Qq(Q-bar)(q-bar)' states with J PC =0 ++ , 1 ++ , 1 +- and 2 ++ in the chiral SU(3) quark model, where Q is the heavy quark (c or b) and q(q') is the light quark (u,d or s). According to our numerical results, it is improbable to make the interpretation of [cn(c-bar)(n-bar)] 1 ++ and [cn(c-bar)(n-bar)] 2 ++ (n=u,d) states as X(3872) and Y(3940), respectively. However, it is interesting to find the tetraquarks in the bq(b-bar)(q-bar)' system. (authors)

  13. 26 CFR 1.408(q)-1 - Deemed IRAs in qualified employer plans.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Pension, Profit-Sharing, Stock Bonus Plans, Etc. § 1.408(q)-1... restrictions that a trustee, custodian, or insurance company is permitted to impose on distributions from... accounts of any of the deemed IRAs is invested in life insurance contracts, regardless of whether the...

  14. Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Lan Liu

    2017-01-01

    Full Text Available As the adoption of Software Defined Networks (SDNs grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled networks. To analyze the spreading processes of network malware (e.g., viruses in SDN, we propose a dynamic model with a time-varying community network, inspired by research models on the spread of epidemics in complex networks across communities. We assume subnets of the network as communities and links that are dense in subnets but sparse between subnets. Using numerical simulation and theoretical analysis, we find that the efficiency of network malware propagation in this model depends on the mobility rate q of the nodes between subnets. We also find that there exists a mobility rate threshold qc. The network malware will spread in the SDN when the mobility rate q>qc. The malware will survive when q>qc and perish when qnetwork malware and provide a theoretical basis to reduce and prevent network security incidents.

  15. Symmetric q-Bessel functions

    Directory of Open Access Journals (Sweden)

    Giuseppe Dattoli

    1996-05-01

    Full Text Available q analog of bessel functions, symmetric under the interchange of q and q^ −1 are introduced. The definition is based on the generating function realized as product of symmetric q-exponential functions with appropriate arguments. Symmetric q-Bessel function are shown to satisfy various identities as well as second-order q-differential equations, which in the limit q1 reproduce those obeyed by the usual cylindrical Bessel functions. A brief discussion on the possible algebraic setting for symmetric q-Bessel functions is also provided.

  16. Analysis of stationary availability factor of two-level backbone computer networks with arbitrary topology

    Science.gov (United States)

    Rahman, P. A.

    2018-05-01

    This scientific paper deals with the two-level backbone computer networks with arbitrary topology. A specialized method, offered by the author for calculation of the stationary availability factor of the two-level backbone computer networks, based on the Markov reliability models for the set of the independent repairable elements with the given failure and repair rates and the methods of the discrete mathematics, is also discussed. A specialized algorithm, offered by the author for analysis of the network connectivity, taking into account different kinds of the network equipment failures, is also observed. Finally, this paper presents an example of calculation of the stationary availability factor for the backbone computer network with the given topology.

  17. A new fault detection method for computer networks

    International Nuclear Information System (INIS)

    Lu, Lu; Xu, Zhengguo; Wang, Wenhai; Sun, Youxian

    2013-01-01

    Over the past few years, fault detection for computer networks has attracted extensive attentions for its importance in network management. Most existing fault detection methods are based on active probing techniques which can detect the occurrence of faults fast and precisely. But these methods suffer from the limitation of traffic overhead, especially in large scale networks. To relieve traffic overhead induced by active probing based methods, a new fault detection method, whose key is to divide the detection process into multiple stages, is proposed in this paper. During each stage, only a small region of the network is detected by using a small set of probes. Meanwhile, it also ensures that the entire network can be covered after multiple detection stages. This method can guarantee that the traffic used by probes during each detection stage is small sufficiently so that the network can operate without severe disturbance from probes. Several simulation results verify the effectiveness of the proposed method

  18. Performance Evaluation of a Novel Optimization Sequential Algorithm (SeQ Code for FTTH Network

    Directory of Open Access Journals (Sweden)

    Fazlina C.A.S.

    2017-01-01

    Full Text Available The SeQ codes has advantages, such as variable cross-correlation property at any given number of users and weights, as well as effectively suppressed the impacts of phase induced intensity noise (PIIN and multiple access interference (MAI cancellation property. The result revealed, at system performance analysis of BER = 10-09, the SeQ code capable to achieved 1 Gbps up to 60 km.

  19. AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

    OpenAIRE

    Mrs. Amandeep Kaur

    2011-01-01

    This paper highlights some of the basic concepts of QoS. The major research areas of Quality of Service Computer Networks are highlighted. The paper also compares some of the current QoS Routing techniques.

  20. High-resolution physical map for chromosome 16q12.1-q13, the Blau syndrome locus

    Directory of Open Access Journals (Sweden)

    Bonavita Gina

    2002-08-01

    Full Text Available Abstract Background The Blau syndrome (MIM 186580, an autosomal dominant granulomatous disease, was previously mapped to chromosome 16p12-q21. However, inconsistent physical maps of the region and consequently an unknown order of microsatellite markers, hampered us from further refining the genetic locus for the Blau syndrome. To address this problem, we constructed our own high-resolution physical map for the Blau susceptibility region. Results We generated a high-resolution physical map that provides more than 90% coverage of a refined Blau susceptibility region. The map consists of four contigs of sequence tagged site-based bacterial artificial chromosomes with a total of 124 bacterial artificial chromosomes, and spans approximately 7.5 Mbp; however, three gaps still exist in this map with sizes of 425, 530 and 375 kbp, respectively, estimated from radiation hybrid mapping. Conclusions Our high-resolution map will assist genetic studies of loci in the interval from D16S3080, near D16S409, and D16S408 (16q12.1 to 16q13.

  1. Computer network data communication controller for the Plutonium Protection System (PPS)

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1978-10-01

    Systems which employ several computers for distributed processing must provide communication links between the computers to effectively utilize their capacity. The technique of using a central network controller to supervise and route messages on a multicomputer digital communications net has certain economic and performance advantages over alternative implementations. Conceptually, the number of stations (computers) which can be accommodated by such a controller is unlimited, but practical considerations dictate a maximum of about 12 to 15. A Data Network Controller (DNC) has been designed around a M6800 microprocessor for use in the Plutonium Protection System (PPS) demonstration facilities

  2. Skeletonized wave-equation inversion for Q

    KAUST Repository

    Dutta, Gaurav

    2016-09-06

    A wave-equation gradient optimization method is presented that inverts for the subsurface Q distribution by minimizing a skeletonized misfit function ε. Here, ε is the sum of the squared differences between the observed and the predicted peak/centroid frequency shifts of the early-arrivals. The gradient is computed by migrating the observed traces weighted by the frequency-shift residuals. The background Q model is perturbed until the predicted and the observed traces have the same peak frequencies or the same centroid frequencies. Numerical tests show that an improved accuracy of the inverted Q model by wave-equation Q tomography (WQ) leads to a noticeable improvement in the migration image quality.

  3. Skeletonized wave-equation inversion for Q

    KAUST Repository

    Dutta, Gaurav; Schuster, Gerard T.

    2016-01-01

    A wave-equation gradient optimization method is presented that inverts for the subsurface Q distribution by minimizing a skeletonized misfit function ε. Here, ε is the sum of the squared differences between the observed and the predicted peak/centroid frequency shifts of the early-arrivals. The gradient is computed by migrating the observed traces weighted by the frequency-shift residuals. The background Q model is perturbed until the predicted and the observed traces have the same peak frequencies or the same centroid frequencies. Numerical tests show that an improved accuracy of the inverted Q model by wave-equation Q tomography (WQ) leads to a noticeable improvement in the migration image quality.

  4. A theoretical and experimental study of neuromorphic atomic switch networks for reservoir computing.

    Science.gov (United States)

    Sillin, Henry O; Aguilera, Renato; Shieh, Hsien-Hang; Avizienis, Audrius V; Aono, Masakazu; Stieg, Adam Z; Gimzewski, James K

    2013-09-27

    Atomic switch networks (ASNs) have been shown to generate network level dynamics that resemble those observed in biological neural networks. To facilitate understanding and control of these behaviors, we developed a numerical model based on the synapse-like properties of individual atomic switches and the random nature of the network wiring. We validated the model against various experimental results highlighting the possibility to functionalize the network plasticity and the differences between an atomic switch in isolation and its behaviors in a network. The effects of changing connectivity density on the nonlinear dynamics were examined as characterized by higher harmonic generation in response to AC inputs. To demonstrate their utility for computation, we subjected the simulated network to training within the framework of reservoir computing and showed initial evidence of the ASN acting as a reservoir which may be optimized for specific tasks by adjusting the input gain. The work presented represents steps in a unified approach to experimentation and theory of complex systems to make ASNs a uniquely scalable platform for neuromorphic computing.

  5. Computer network prepared to handle massive data flow

    CERN Multimedia

    2006-01-01

    "Massive quantities of data will soon begin flowing from the largest scientific instrument ever built into an internationl network of computer centers, including one operated jointly by the University of Chicago and Indiana University." (2 pages)

  6. 26 CFR 1.414(q)-1T - Highly compensated employee (temporary).

    Science.gov (United States)

    2010-04-01

    ...-10Definition of officer and rules on inclusion of officers in highly compensated group. Q&A-11Rules with... rules for permanent and total disability and employee stock ownership plans respectively). (c) Other... pursuant to section 401(c)(1). This rule with respect to the inclusion of certain self-employed individuals...

  7. Replication the association of 2q32.2-q32.3 and 14q32.11 with hepatocellular carcinoma.

    Science.gov (United States)

    Chen, Wei; Wang, Mingquan; Zhang, Zhen; Tang, Huayang; Zuo, Xianbo; Meng, Xiangling; Xiong, Maoming; Zhou, Fusheng; Liang, Bo; Dai, Fen; Fang, Jun; Gao, Jinping; Zhu, Jun; Zhu, Yong; Wan, Hong; Wang, Miaofeng; Chan, Shixin; Sun, Liangdan

    2015-04-25

    Hepatocellular carcinoma (HCC) is a malignant tumor. The morbidity and mortality of HCC tend to ascend and become a serious threat to the population health. Genetic studies of HCC have identified several susceptibility loci of HCC. In this study, we aim to replicate the association of these loci in our samples from Chinese population and further investigate the genetic interaction. We selected 16 SNPs within 1p36.22, 2q32.2-q32.3, 3p21.33, 8p12, 14q32.11 and 21q21.3 and genotyped in 507 HCC patients and 3014 controls by using Sequenom MassARRAY system. Association analyses were performed by using PLINK 1.07. We observed that the STAT4 (2q32.2-q32.3) at rs7574865 (P=1.17×10(-3), OR=0.79) and EFCAB11 (14q32.11) at rs8013403 (P=1.54×10(-3), OR=0.80) were significantly associated with HCC in this study. In 3p21.33, genetic variant rs6795737 within GLB1 was also observed with suggestive evidence (P=9.98×10(-3), OR=0.84). In the interaction analysis, the pair of associated SNPs (rs7574865 within STAT4, rs8013403 within EFCAB11) generated evidence for interaction (P=4.10×10(-3)). In summary, our work first reported the association of 14q32.11 (EFCAB11) with HCC in Chinese Han population and revealed the genetic interaction between STAT4 (2q32.2-q32.3) and EFCAB11 (14q32.11) in HCC. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  9. 23 CFR 658.21 - Identification of National Network.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Identification of National Network. 658.21 Section 658... Identification of National Network. (a) To identify the National Network, a State may sign the routes or provide maps of lists of highways describing the National Network. (b) Exceptional local conditions on the...

  10. Distinguishing humans from computers in the game of go: A complex network approach

    Science.gov (United States)

    Coquidé, C.; Georgeot, B.; Giraud, O.

    2017-08-01

    We compare complex networks built from the game of go and obtained from databases of human-played games with those obtained from computer-played games. Our investigations show that statistical features of the human-based networks and the computer-based networks differ, and that these differences can be statistically significant on a relatively small number of games using specific estimators. We show that the deterministic or stochastic nature of the computer algorithm playing the game can also be distinguished from these quantities. This can be seen as a tool to implement a Turing-like test for go simulators.

  11. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 47: The value of computer networks in aerospace

    Science.gov (United States)

    Bishop, Ann Peterson; Pinelli, Thomas E.

    1995-01-01

    This paper presents data on the value of computer networks that were obtained from a national survey of 2000 aerospace engineers that was conducted in 1993. Survey respondents reported the extent to which they used computer networks in their work and communication and offered their assessments of the value of various network types and applications. They also provided information about the positive impacts of networks on their work, which presents another perspective on value. Finally, aerospace engineers' recommendations on network implementation present suggestions for increasing the value of computer networks within aerospace organizations.

  12. K121Q ENPP1/PC-1 gene polymorphism is associated with insulin ...

    Indian Academy of Sciences (India)

    2013-12-04

    Dec 4, 2013 ... ciation of ENPP1/PC-1 K121Q polymorphism with obesity ... vided history of previously diagnosed diabetes or the fasting blood glucose was ≥ 126 ... Mean values of continuous traits were compared using the. Student's t-test ...

  13. Computer-Supported Modelling of Multi modal Transportation Networks Rationalization

    Directory of Open Access Journals (Sweden)

    Ratko Zelenika

    2007-09-01

    Full Text Available This paper deals with issues of shaping and functioning ofcomputer programs in the modelling and solving of multimoda Itransportation network problems. A methodology of an integrateduse of a programming language for mathematical modellingis defined, as well as spreadsheets for the solving of complexmultimodal transportation network problems. The papercontains a comparison of the partial and integral methods ofsolving multimodal transportation networks. The basic hypothesisset forth in this paper is that the integral method results inbetter multimodal transportation network rationalization effects,whereas a multimodal transportation network modelbased on the integral method, once built, can be used as the basisfor all kinds of transportation problems within multimodaltransport. As opposed to linear transport problems, multimodaltransport network can assume very complex shapes. This papercontains a comparison of the partial and integral approach totransp01tation network solving. In the partial approach, astraightforward model of a transp01tation network, which canbe solved through the use of the Solver computer tool within theExcel spreadsheet inteiface, is quite sufficient. In the solving ofa multimodal transportation problem through the integralmethod, it is necessmy to apply sophisticated mathematicalmodelling programming languages which supp01t the use ofcomplex matrix functions and the processing of a vast amountof variables and limitations. The LINGO programming languageis more abstract than the Excel spreadsheet, and it requiresa certain programming knowledge. The definition andpresentation of a problem logic within Excel, in a manner whichis acceptable to computer software, is an ideal basis for modellingin the LINGO programming language, as well as a fasterand more effective implementation of the mathematical model.This paper provides proof for the fact that it is more rational tosolve the problem of multimodal transportation networks by

  14. Human Inspired Self-developmental Model of Neural Network (HIM): Introducing Content/Form Computing

    Science.gov (United States)

    Krajíček, Jiří

    This paper presents cross-disciplinary research between medical/psychological evidence on human abilities and informatics needs to update current models in computer science to support alternative methods for computation and communication. In [10] we have already proposed hypothesis introducing concept of human information model (HIM) as cooperative system. Here we continue on HIM design in detail. In our design, first we introduce Content/Form computing system which is new principle of present methods in evolutionary computing (genetic algorithms, genetic programming). Then we apply this system on HIM (type of artificial neural network) model as basic network self-developmental paradigm. Main inspiration of our natural/human design comes from well known concept of artificial neural networks, medical/psychological evidence and Sheldrake theory of "Nature as Alive" [22].

  15. Altered structural network architecture is predictive of the presence of psychotic symptoms in patients with 22q11.2 deletion syndrome

    Directory of Open Access Journals (Sweden)

    Maria C. Padula

    2017-01-01

    Our results point to alterations in structural network architecture and white matter microstructure in patients with 22q11DS with attenuated positive symptoms, mainly involving connections of the limbic system. These alterations may therefore represent a potential biomarker for an increased risk of psychosis that should be further tested in longitudinal studies.

  16. Advances in neural networks computational and theoretical issues

    CERN Document Server

    Esposito, Anna; Morabito, Francesco

    2015-01-01

    This book collects research works that exploit neural networks and machine learning techniques from a multidisciplinary perspective. Subjects covered include theoretical, methodological and computational topics which are grouped together into chapters devoted to the discussion of novelties and innovations related to the field of Artificial Neural Networks as well as the use of neural networks for applications, pattern recognition, signal processing, and special topics such as the detection and recognition of multimodal emotional expressions and daily cognitive functions, and  bio-inspired memristor-based networks.  Providing insights into the latest research interest from a pool of international experts coming from different research fields, the volume becomes valuable to all those with any interest in a holistic approach to implement believable, autonomous, adaptive, and context-aware Information Communication Technologies.

  17. Molecular mapping of qBK1 WD , a major QTL for bakanae disease resistance in rice.

    Science.gov (United States)

    Lee, Sais-Beul; Hur, Yeon-Jae; Cho, Jun-Hyeon; Lee, Jong-Hee; Kim, Tae-Heon; Cho, Soo-Min; Song, You-Chun; Seo, Young-Su; Lee, Jungkwan; Kim, Tae-Sung; Park, Yong-Jin; Oh, Myung-Kyu; Park, Dong-Soo

    2018-01-10

    Bakanae or foot rot disease is a prominent disease of rice caused by Gibberella fujikuroi. This disease may infect rice plants from the pre-emergence stage to the mature stage. In recent years, raising rice seedlings in seed boxes for mechanical transplanting has increased the incidence of many seedling diseases; only a few rice varieties have been reported to exhibit resistance to bakanae disease. In this study, we attempted to identify quantitative trait loci (QTLs) conferring bakanae disease resistance from the highly resistant japonica variety Wonseadaesoo. A primary QTL study using the genotypes/phenotypes of the recombinant inbred lines (RILs) indicated that the locus qBK1 WD conferring resistance to bakanae disease from Wonseadaesoo was located in a 1.59 Mb interval delimited on the physical map between chr01_13542347 (13.54 Mb) and chr01_15132528 (15.13 Mb). The log of odds (LOD) score of qBK1 WD was 8.29, accounting for 20.2% of the total phenotypic variation. We further identified a gene pyramiding effect of two QTLs, qBK WD and previously developed qBK1. The mean proportion of healthy plant for 31 F 4 RILs that had no resistance genes was 35.3%, which was similar to that of the susceptible check variety Ilpum. The proportion of healthy plants for the lines with only qBK WD or qBK1 was 66.1% and 55.5%, respectively, which was significantly higher than that of the lines without resistance genes and that of Ilpum. The mean proportion of the healthy plant for 15 F 4 RILs harboring both qBK WD and qBK1 was 80.2%, which was significantly higher than that of the lines with only qBK WD or qBK1. Introducing qBK WD or pyramiding the QTLs qBK WD and qBK1 could provide effective tools for breeding rice with bakanae disease resistance. To our knowledge, this is the first report on a gene pyramiding effect that provides higher resistance against bakanae disease.

  18. The ENSDF radioactivity data base for IBM-PC and computer network access

    International Nuclear Information System (INIS)

    Ekstroem, P.; Spanier, L.

    1989-08-01

    A data base system for radioactivity gamma rays is described. A base with approximately 15000 gamma rays from 2777 decays is available for installation on the hard disk of a PC, and a complete system with approximately 73000 gamma rays is available for on-line access via the NORDic University computer NETwork (NORDUNET) and the Swedish University computer NETwork (SUNET)

  19. Structure of the HIV-1 reverse transcriptase Q151M mutant: insights into the inhibitor resistance of HIV-1 reverse transcriptase and the structure of the nucleotide-binding pocket of Hepatitis B virus polymerase

    International Nuclear Information System (INIS)

    Nakamura, Akiyoshi; Tamura, Noriko; Yasutake, Yoshiaki

    2015-01-01

    The structure of the HIV-1 reverse transcriptase Q151M mutant was determined at a resolution of 2.6 Å in space group P321. Hepatitis B virus polymerase (HBV Pol) is an important target for anti-HBV drug development; however, its low solubility and stability in vitro has hindered detailed structural studies. Certain nucleotide reverse transcriptase (RT) inhibitors (NRTIs) such as tenofovir and lamivudine can inhibit both HBV Pol and Human immunodeficiency virus 1 (HIV-1) RT, leading to speculation on structural and mechanistic analogies between the deoxynucleotide triphosphate (dNTP)-binding sites of these enzymes. The Q151M mutation in HIV-1 RT, located at the dNTP-binding site, confers resistance to various NRTIs, while maintaining sensitivity to tenofovir and lamivudine. The residue corresponding to Gln151 is strictly conserved as a methionine in HBV Pol. Therefore, the structure of the dNTP-binding pocket of the HIV-1 RT Q151M mutant may reflect that of HBV Pol. Here, the crystal structure of HIV-1 RT Q151M, determined at 2.6 Å resolution, in a new crystal form with space group P321 is presented. Although the structure of HIV-1 RT Q151M superimposes well onto that of HIV-1 RT in a closed conformation, a slight movement of the β-strands (β2–β3) that partially create the dNTP-binding pocket was observed. This movement might be caused by the introduction of the bulky thioether group of Met151. The structure also highlighted the possibility that the hydrogen-bonding network among amino acids and NRTIs is rearranged by the Q151M mutation, leading to a difference in the affinity of NRTIs for HIV-1 RT and HBV Pol

  20. Structure of the HIV-1 reverse transcriptase Q151M mutant: insights into the inhibitor resistance of HIV-1 reverse transcriptase and the structure of the nucleotide-binding pocket of Hepatitis B virus polymerase

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, Akiyoshi; Tamura, Noriko; Yasutake, Yoshiaki, E-mail: y-yasutake@aist.go.jp [National Institute of Advanced Industrial Science and Technology (AIST), 2-17-2-1 Tsukisamu-Higashi, Toyohira, Sapporo, Hokkaido 062-8517 (Japan)

    2015-10-23

    The structure of the HIV-1 reverse transcriptase Q151M mutant was determined at a resolution of 2.6 Å in space group P321. Hepatitis B virus polymerase (HBV Pol) is an important target for anti-HBV drug development; however, its low solubility and stability in vitro has hindered detailed structural studies. Certain nucleotide reverse transcriptase (RT) inhibitors (NRTIs) such as tenofovir and lamivudine can inhibit both HBV Pol and Human immunodeficiency virus 1 (HIV-1) RT, leading to speculation on structural and mechanistic analogies between the deoxynucleotide triphosphate (dNTP)-binding sites of these enzymes. The Q151M mutation in HIV-1 RT, located at the dNTP-binding site, confers resistance to various NRTIs, while maintaining sensitivity to tenofovir and lamivudine. The residue corresponding to Gln151 is strictly conserved as a methionine in HBV Pol. Therefore, the structure of the dNTP-binding pocket of the HIV-1 RT Q151M mutant may reflect that of HBV Pol. Here, the crystal structure of HIV-1 RT Q151M, determined at 2.6 Å resolution, in a new crystal form with space group P321 is presented. Although the structure of HIV-1 RT Q151M superimposes well onto that of HIV-1 RT in a closed conformation, a slight movement of the β-strands (β2–β3) that partially create the dNTP-binding pocket was observed. This movement might be caused by the introduction of the bulky thioether group of Met151. The structure also highlighted the possibility that the hydrogen-bonding network among amino acids and NRTIs is rearranged by the Q151M mutation, leading to a difference in the affinity of NRTIs for HIV-1 RT and HBV Pol.

  1. Compact self-Q-switched Tm:YLF laser at 1.91 μm

    Science.gov (United States)

    Zhang, B.; Li, L.; He, C. J.; Tian, F. J.; Yang, X. T.; Cui, J. H.; Zhang, J. Z.; Sun, W. M.

    2018-03-01

    We report self-Q-switching operation in a diode-pumped Tm:YLF bulk laser by exploiting saturable re-absorption under the quasi-three-level regime. Robust self-Q-switched pulse output at 1.91 μm in fundamental mode is demonstrated experimentally with 1.5 at.% doped Tm:YLF crystal. At maximum absorbed pump power of 4.5 W, the average output power and pulse energy are obtained as high as 610 mW and 29 μJ, respectively, with the corresponding slope efficiency of 22%. Pulse repetition rate is tunable in the range of 3-21 kHz with changing the pump power. The dynamics of self-Q-switching of Tm:YLF laser are discussed with the help of a rate equation model showing good agreement with the experiment. The compact self-Q-switched laser near 2 μm has potential application in laser radar systems for accurate wind velocity measurements.

  2. Future Communication, Computing, Control and Management Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  3. Exotic tetraquark states with the qq anti Q anti Q configuration

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Si-Qiang; Chen, Kan; Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics, CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Liu, Yan-Rui [Shandong University, School of Physics and Key Laboratory of Particle Physics and Particle Irradiation (MOE), Jinan (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center for High Energy Physics, Beijing (China)

    2017-10-15

    In this work, we study systematically the mass splittings of the qq anti Q anti Q (q = u, d, s and Q = c, b) tetraquark states with the color-magnetic interaction by considering color mixing effects and estimate roughly their masses. We find that the color mixing effect is relatively important for the J{sup P} = 0{sup +} states and possible stable tetraquarks exist in the nn anti Q anti Q (n = u, d) and ns anti Q anti Q systems either with J = 0 or with J = 1. Possible decay patterns of the tetraquarks are briefly discussed. (orig.)

  4. Synthetic tetracycline-inducible regulatory networks: computer-aided design of dynamic phenotypes

    Directory of Open Access Journals (Sweden)

    Kaznessis Yiannis N

    2007-01-01

    Full Text Available Abstract Background Tightly regulated gene networks, precisely controlling the expression of protein molecules, have received considerable interest by the biomedical community due to their promising applications. Among the most well studied inducible transcription systems are the tetracycline regulatory expression systems based on the tetracycline resistance operon of Escherichia coli, Tet-Off (tTA and Tet-On (rtTA. Despite their initial success and improved designs, limitations still persist, such as low inducer sensitivity. Instead of looking at these networks statically, and simply changing or mutating the promoter and operator regions with trial and error, a systematic investigation of the dynamic behavior of the network can result in rational design of regulatory gene expression systems. Sophisticated algorithms can accurately capture the dynamical behavior of gene networks. With computer aided design, we aim to improve the synthesis of regulatory networks and propose new designs that enable tighter control of expression. Results In this paper we engineer novel networks by recombining existing genes or part of genes. We synthesize four novel regulatory networks based on the Tet-Off and Tet-On systems. We model all the known individual biomolecular interactions involved in transcription, translation, regulation and induction. With multiple time-scale stochastic-discrete and stochastic-continuous models we accurately capture the transient and steady state dynamics of these networks. Important biomolecular interactions are identified and the strength of the interactions engineered to satisfy design criteria. A set of clear design rules is developed and appropriate mutants of regulatory proteins and operator sites are proposed. Conclusion The complexity of biomolecular interactions is accurately captured through computer simulations. Computer simulations allow us to look into the molecular level, portray the dynamic behavior of gene regulatory

  5. All (4,1): Sigma models with (4,q) off-shell supersymmetry

    Energy Technology Data Exchange (ETDEWEB)

    Hull, Chris [The Blackett Laboratory, Imperial College London,Prince Consort Road London SW7 @AZ (United Kingdom); Lindström, Ulf [The Blackett Laboratory, Imperial College London,Prince Consort Road London SW7 @AZ (United Kingdom); Department of Physics and Astronomy, Division of Theoretical Physics,Uppsala University, Box 516, SE-751 20 Uppsala (Sweden)

    2017-03-08

    Off-shell (4,q) supermultiplets in 2-dimensions are constructed for q=1,2,4. These are used to construct sigma models whose target spaces are hyperkähler with torsion. The off-shell supersymmetry implies the three complex structures are simultaneously integrable and allows us to construct actions using extended superspace and projective superspace, giving an explicit construction of the target space geometries.

  6. Efficient computation of aerodynamic influence coefficients for aeroelastic analysis on a transputer network

    Science.gov (United States)

    Janetzke, David C.; Murthy, Durbha V.

    1991-01-01

    Aeroelastic analysis is multi-disciplinary and computationally expensive. Hence, it can greatly benefit from parallel processing. As part of an effort to develop an aeroelastic capability on a distributed memory transputer network, a parallel algorithm for the computation of aerodynamic influence coefficients is implemented on a network of 32 transputers. The aerodynamic influence coefficients are calculated using a 3-D unsteady aerodynamic model and a parallel discretization. Efficiencies up to 85 percent were demonstrated using 32 processors. The effect of subtask ordering, problem size, and network topology are presented. A comparison to results on a shared memory computer indicates that higher speedup is achieved on the distributed memory system.

  7. Parallel computation of aerodynamic influence coefficients for aeroelastic analysis on a transputer network

    Science.gov (United States)

    Janetzke, D. C.; Murthy, D. V.

    1991-01-01

    Aeroelastic analysis is mult-disciplinary and computationally expensive. Hence, it can greatly benefit from parallel processing. As part of an effort to develop an aeroelastic analysis capability on a distributed-memory transputer network, a parallel algorithm for the computation of aerodynamic influence coefficients is implemented on a network of 32 transputers. The aerodynamic influence coefficients are calculated using a three-dimensional unsteady aerodynamic model and a panel discretization. Efficiencies up to 85 percent are demonstrated using 32 processors. The effects of subtask ordering, problem size and network topology are presented. A comparison to results on a shared-memory computer indicates that higher speedup is achieved on the distributed-memory system.

  8. q-deformation of ''W3'', Virasoro and U(1)-Kac-Moody algebras

    International Nuclear Information System (INIS)

    El Hassouni, A.; Tahri, E.H.; Zakkari, M.

    1995-07-01

    A deformation of the algebra of infinite matrices gl(∞, C) is given. We show that this operation leads to the realization of a deformed ''W 3 '' like algebra. The central extension of the q-U(1) Kac-Moody and the q-Virasoro algebra is performed. (author). 10 refs

  9. Role of casein kinase 1A1 in the biology and targeted therapy of del(5q) MDS

    Science.gov (United States)

    Schneider, Rebekka K.; Ademà, Vera; Heckl, Dirk; Järås, Marcus; Mallo, Mar; Lord, Allegra M.; Chu, Lisa P.; McConkey, Marie E.; Kramann, Rafael; Mullally, Ann; Bejar, Rafael; Solé, Francesc; Ebert, Benjamin L.

    2014-01-01

    Summary The Casein kinase 1A1 gene (CSNK1A1) is a putative tumor suppressor gene located in the common deleted region for del(5q) myelodysplastic syndrome (MDS). We generated a murine model with conditional inactivation of Csnk1a1 and found that Csnk1a1 haploinsufficiency induces hematopoietic stem cell expansion and a competitive repopulation advantage whereas homozygous deletion induces hematopoietic stem cell failure. Based on this finding, we found that heterozygous inactivation of Csnk1a1 sensitizes cells to a CSNK1 inhibitor relative to cells with two intact alleles. In addition, we identified recurrent somatic mutations in CSNK1A1 on the non-deleted allele of patients with del(5q) MDS. These studies demonstrate that CSNK1A1 plays a central role in the biology of del(5q) MDS and is a promising therapeutic target. PMID:25242043

  10. Predictive Behavior of a Computational Foot/Ankle Model through Artificial Neural Networks.

    Science.gov (United States)

    Chande, Ruchi D; Hargraves, Rosalyn Hobson; Ortiz-Robinson, Norma; Wayne, Jennifer S

    2017-01-01

    Computational models are useful tools to study the biomechanics of human joints. Their predictive performance is heavily dependent on bony anatomy and soft tissue properties. Imaging data provides anatomical requirements while approximate tissue properties are implemented from literature data, when available. We sought to improve the predictive capability of a computational foot/ankle model by optimizing its ligament stiffness inputs using feedforward and radial basis function neural networks. While the former demonstrated better performance than the latter per mean square error, both networks provided reasonable stiffness predictions for implementation into the computational model.

  11. Computational Models and Emergent Properties of Respiratory Neural Networks

    Science.gov (United States)

    Lindsey, Bruce G.; Rybak, Ilya A.; Smith, Jeffrey C.

    2012-01-01

    Computational models of the neural control system for breathing in mammals provide a theoretical and computational framework bringing together experimental data obtained from different animal preparations under various experimental conditions. Many of these models were developed in parallel and iteratively with experimental studies and provided predictions guiding new experiments. This data-driven modeling approach has advanced our understanding of respiratory network architecture and neural mechanisms underlying generation of the respiratory rhythm and pattern, including their functional reorganization under different physiological conditions. Models reviewed here vary in neurobiological details and computational complexity and span multiple spatiotemporal scales of respiratory control mechanisms. Recent models describe interacting populations of respiratory neurons spatially distributed within the Bötzinger and pre-Bötzinger complexes and rostral ventrolateral medulla that contain core circuits of the respiratory central pattern generator (CPG). Network interactions within these circuits along with intrinsic rhythmogenic properties of neurons form a hierarchy of multiple rhythm generation mechanisms. The functional expression of these mechanisms is controlled by input drives from other brainstem components, including the retrotrapezoid nucleus and pons, which regulate the dynamic behavior of the core circuitry. The emerging view is that the brainstem respiratory network has rhythmogenic capabilities at multiple levels of circuit organization. This allows flexible, state-dependent expression of different neural pattern-generation mechanisms under various physiological conditions, enabling a wide repertoire of respiratory behaviors. Some models consider control of the respiratory CPG by pulmonary feedback and network reconfiguration during defensive behaviors such as cough. Future directions in modeling of the respiratory CPG are considered. PMID:23687564

  12. Main control computer security model of closed network systems protection against cyber attacks

    Science.gov (United States)

    Seymen, Bilal

    2014-06-01

    The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.

  13. Computationally Efficient Nonlinear Bell Inequalities for Quantum Networks

    Science.gov (United States)

    Luo, Ming-Xing

    2018-04-01

    The correlations in quantum networks have attracted strong interest with new types of violations of the locality. The standard Bell inequalities cannot characterize the multipartite correlations that are generated by multiple sources. The main problem is that no computationally efficient method is available for constructing useful Bell inequalities for general quantum networks. In this work, we show a significant improvement by presenting new, explicit Bell-type inequalities for general networks including cyclic networks. These nonlinear inequalities are related to the matching problem of an equivalent unweighted bipartite graph that allows constructing a polynomial-time algorithm. For the quantum resources consisting of bipartite entangled pure states and generalized Greenberger-Horne-Zeilinger (GHZ) states, we prove the generic nonmultilocality of quantum networks with multiple independent observers using new Bell inequalities. The violations are maximal with respect to the presented Tsirelson's bound for Einstein-Podolsky-Rosen states and GHZ states. Moreover, these violations hold for Werner states or some general noisy states. Our results suggest that the presented Bell inequalities can be used to characterize experimental quantum networks.

  14. A sex-specific association between a 15q25 variant and upper aerodigestive tract cancers.

    LENUS (Irish Health Repository)

    Chen, Dan

    2011-04-01

    Sequence variants located at 15q25 have been associated with lung cancer and propensity to smoke. We recently reported an association between rs16969968 and risk of upper aerodigestive tract (UADT) cancers (oral cavity, oropharynx, hypopharynx, larynx, and esophagus) in women (OR = 1.24, P = 0.003) with little effect in men (OR = 1.04, P = 0.35).

  15. Innovations and advances in computing, informatics, systems sciences, networking and engineering

    CERN Document Server

    Elleithy, Khaled

    2015-01-01

    Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering  This book includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Informatics, and Systems Sciences, and Engineering. It includes selected papers from the conference proceedings of the Eighth and some selected papers of the Ninth International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2012 & CISSE 2013). Coverage includes topics in: Industrial Electronics, Technology & Automation, Telecommunications and Networking, Systems, Computing Sciences and Software Engineering, Engineering Education, Instructional Technology, Assessment, and E-learning.  ·       Provides the latest in a series of books growing out of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering; ·       Includes chapters in the most a...

  16. AN EVALUATION AND IMPLEMENTATION OF COLLABORATIVE AND SOCIAL NETWORKING TECHNOLOGIES FOR COMPUTER EDUCATION

    OpenAIRE

    Ronnie Cheung; Calvin Wan

    2011-01-01

    We have developed a collaborative and social networking environment that integrates the knowledge and skills in communication and computing studies with a multimedia development project. The outcomes of the students’ projects show that computer literacy can be enhanced through a cluster of communication, social, and digital skills. Experience in implementing a web-based social networking environment shows that the new media is an effective means of enriching knowledge by sharing in computer l...

  17. Topology and computational performance of attractor neural networks

    International Nuclear Information System (INIS)

    McGraw, Patrick N.; Menzinger, Michael

    2003-01-01

    To explore the relation between network structure and function, we studied the computational performance of Hopfield-type attractor neural nets with regular lattice, random, small-world, and scale-free topologies. The random configuration is the most efficient for storage and retrieval of patterns by the network as a whole. However, in the scale-free case retrieval errors are not distributed uniformly among the nodes. The portion of a pattern encoded by the subset of highly connected nodes is more robust and efficiently recognized than the rest of the pattern. The scale-free network thus achieves a very strong partial recognition. The implications of these findings for brain function and social dynamics are suggestive

  18. MDA-image: an environment of networked desktop computers for teleradiology/pathology.

    Science.gov (United States)

    Moffitt, M E; Richli, W R; Carrasco, C H; Wallace, S; Zimmerman, S O; Ayala, A G; Benjamin, R S; Chee, S; Wood, P; Daniels, P

    1991-04-01

    MDA-Image, a project of The University of Texas M. D. Anderson Cancer Center, is an environment of networked desktop computers for teleradiology/pathology. Radiographic film is digitized with a film scanner and histopathologic slides are digitized using a red, green, and blue (RGB) video camera connected to a microscope. Digitized images are stored on a data server connected to the institution's computer communication network (Ethernet) and can be displayed from authorized desktop computers connected to Ethernet. Images are digitized for cases presented at the Bone Tumor Management Conference, a multidisciplinary conference in which treatment options are discussed among clinicians, surgeons, radiologists, pathologists, radiotherapists, and medical oncologists. These radiographic and histologic images are shown on a large screen computer monitor during the conference. They are available for later review for follow-up or representation.

  19. Automation of multi-agent control for complex dynamic systems in heterogeneous computational network

    Science.gov (United States)

    Oparin, Gennady; Feoktistov, Alexander; Bogdanova, Vera; Sidorov, Ivan

    2017-01-01

    The rapid progress of high-performance computing entails new challenges related to solving large scientific problems for various subject domains in a heterogeneous distributed computing environment (e.g., a network, Grid system, or Cloud infrastructure). The specialists in the field of parallel and distributed computing give the special attention to a scalability of applications for problem solving. An effective management of the scalable application in the heterogeneous distributed computing environment is still a non-trivial issue. Control systems that operate in networks, especially relate to this issue. We propose a new approach to the multi-agent management for the scalable applications in the heterogeneous computational network. The fundamentals of our approach are the integrated use of conceptual programming, simulation modeling, network monitoring, multi-agent management, and service-oriented programming. We developed a special framework for an automation of the problem solving. Advantages of the proposed approach are demonstrated on the parametric synthesis example of the static linear regulator for complex dynamic systems. Benefits of the scalable application for solving this problem include automation of the multi-agent control for the systems in a parallel mode with various degrees of its detailed elaboration.

  20. Parallel computation with molecular-motor-propelled agents in nanofabricated networks.

    Science.gov (United States)

    Nicolau, Dan V; Lard, Mercy; Korten, Till; van Delft, Falco C M J M; Persson, Malin; Bengtsson, Elina; Månsson, Alf; Diez, Stefan; Linke, Heiner; Nicolau, Dan V

    2016-03-08

    The combinatorial nature of many important mathematical problems, including nondeterministic-polynomial-time (NP)-complete problems, places a severe limitation on the problem size that can be solved with conventional, sequentially operating electronic computers. There have been significant efforts in conceiving parallel-computation approaches in the past, for example: DNA computation, quantum computation, and microfluidics-based computation. However, these approaches have not proven, so far, to be scalable and practical from a fabrication and operational perspective. Here, we report the foundations of an alternative parallel-computation system in which a given combinatorial problem is encoded into a graphical, modular network that is embedded in a nanofabricated planar device. Exploring the network in a parallel fashion using a large number of independent, molecular-motor-propelled agents then solves the mathematical problem. This approach uses orders of magnitude less energy than conventional computers, thus addressing issues related to power consumption and heat dissipation. We provide a proof-of-concept demonstration of such a device by solving, in a parallel fashion, the small instance {2, 5, 9} of the subset sum problem, which is a benchmark NP-complete problem. Finally, we discuss the technical advances necessary to make our system scalable with presently available technology.

  1. Multi-hop amplify-and-forward relaying cooperation in the presence of I/Q imbalance

    KAUST Repository

    Qi, Jian; Aï ssa, Sonia; Alouini, Mohamed-Slim

    2013-01-01

    In this paper, multi-hop cooperative networks implementing channel state information (CSI)-assisted amplify-and-forward (AF) relaying in the presence of in-phase and quadrature-phase (I/Q) imbalance are investigated. We propose a compensation algorithm for the I/Q imbalance. The performance of the multi-hop CSI-assisted AF cooperative networks with and without compensation for I/Q imbalance in Nakagami-m fading environment is evaluated in terms of average symbol error probability. Numerical results are provided and show that the proposed compensation method can effectively mitigate the impact of I/Q imbalance. © 2013 IEEE.

  2. Multi-hop amplify-and-forward relaying cooperation in the presence of I/Q imbalance

    KAUST Repository

    Qi, Jian

    2013-06-01

    In this paper, multi-hop cooperative networks implementing channel state information (CSI)-assisted amplify-and-forward (AF) relaying in the presence of in-phase and quadrature-phase (I/Q) imbalance are investigated. We propose a compensation algorithm for the I/Q imbalance. The performance of the multi-hop CSI-assisted AF cooperative networks with and without compensation for I/Q imbalance in Nakagami-m fading environment is evaluated in terms of average symbol error probability. Numerical results are provided and show that the proposed compensation method can effectively mitigate the impact of I/Q imbalance. © 2013 IEEE.

  3. Traffic Dynamics of Computer Networks

    Science.gov (United States)

    Fekete, Attila

    2008-10-01

    Two important aspects of the Internet, namely the properties of its topology and the characteristics of its data traffic, have attracted growing attention of the physics community. My thesis has considered problems of both aspects. First I studied the stochastic behavior of TCP, the primary algorithm governing traffic in the current Internet, in an elementary network scenario consisting of a standalone infinite-sized buffer and an access link. The effect of the fast recovery and fast retransmission (FR/FR) algorithms is also considered. I showed that my model can be extended further to involve the effect of link propagation delay, characteristic of WAN. I continued my thesis with the investigation of finite-sized semi-bottleneck buffers, where packets can be dropped not only at the link, but also at the buffer. I demonstrated that the behavior of the system depends only on a certain combination of the parameters. Moreover, an analytic formula was derived that gives the ratio of packet loss rate at the buffer to the total packet loss rate. This formula makes it possible to treat buffer-losses as if they were link-losses. Finally, I studied computer networks from a structural perspective. I demonstrated through fluid simulations that the distribution of resources, specifically the link bandwidth, has a serious impact on the global performance of the network. Then I analyzed the distribution of edge betweenness in a growing scale-free tree under the condition that a local property, the in-degree of the "younger" node of an arbitrary edge, is known in order to find an optimum distribution of link capacity. The derived formula is exact even for finite-sized networks. I also calculated the conditional expectation of edge betweenness, rescaled for infinite networks.

  4. Cytoadhesion to gC1qR through Plasmodium falciparum erythrocyte membrane protein 1 in severe malaria

    DEFF Research Database (Denmark)

    Magallón-Tejada, Ariel; Machevo, Sónia; Cisteró, Pau

    2016-01-01

    Cytoadhesion of Plasmodium falciparum infected erythrocytes to gC1qR has been associated with severe malaria, but the parasite ligand involved is currently unknown. To assess if binding to gC1qR is mediated through the P. falciparum erythrocyte membrane protein 1 (PfEMP1) family, we analyzed...

  5. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  6. Genetic and phenotypic dissection of 1q43q44 microdeletion syndrome and neurodevelopmental phenotypes associated with mutations in ZBTB18 and HNRNPU

    DEFF Research Database (Denmark)

    Depienne, Christel; Nava, Caroline; Keren, Boris

    2017-01-01

    Subtelomeric 1q43q44 microdeletions cause a syndrome associating intellectual disability, microcephaly, seizures and anomalies of the corpus callosum. Despite several previous studies assessing genotype-phenotype correlations, the contribution of genes located in this region to the specific featu...

  7. Estimation of the number of extreme pathways for metabolic networks

    Directory of Open Access Journals (Sweden)

    Thiele Ines

    2007-09-01

    Full Text Available Abstract Background The set of extreme pathways (ExPa, {pi}, defines the convex basis vectors used for the mathematical characterization of the null space of the stoichiometric matrix for biochemical reaction networks. ExPa analysis has been used for a number of studies to determine properties of metabolic networks as well as to obtain insight into their physiological and functional states in silico. However, the number of ExPas, p = |{pi}|, grows with the size and complexity of the network being studied, and this poses a computational challenge. For this study, we investigated the relationship between the number of extreme pathways and simple network properties. Results We established an estimating function for the number of ExPas using these easily obtainable network measurements. In particular, it was found that log [p] had an exponential relationship with log⁡[∑i=1Rd−id+ici] MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacyGGSbaBcqGGVbWBcqGGNbWzdaWadaqaamaaqadabaGaemizaq2aaSbaaSqaaiabgkHiTmaaBaaameaacqWGPbqAaeqaaaWcbeaakiabdsgaKnaaBaaaleaacqGHRaWkdaWgaaadbaGaemyAaKgabeaaaSqabaGccqWGJbWydaWgaaWcbaGaemyAaKgabeaaaeaacqWGPbqAcqGH9aqpcqaIXaqmaeaacqWGsbGua0GaeyyeIuoaaOGaay5waiaaw2faaaaa@4414@, where R = |Reff| is the number of active reactions in a network, d−i MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacqWGKbazdaWgaaWcbaGaeyOeI0YaaSbaaWqaaiabdMgaPbqabaaaleqaaaaa@30A9@ and d+i MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb

  8. A Social Network Approach to Provisioning and Management of Cloud Computing Services for Enterprises

    DEFF Research Database (Denmark)

    Kuada, Eric; Olesen, Henning

    2011-01-01

    This paper proposes a social network approach to the provisioning and management of cloud computing services termed Opportunistic Cloud Computing Services (OCCS), for enterprises; and presents the research issues that need to be addressed for its implementation. We hypothesise that OCCS...... will facilitate the adoption process of cloud computing services by enterprises. OCCS deals with the concept of enterprises taking advantage of cloud computing services to meet their business needs without having to pay or paying a minimal fee for the services. The OCCS network will be modelled and implemented...... as a social network of enterprises collaborating strategically for the provisioning and consumption of cloud computing services without entering into any business agreements. We conclude that it is possible to configure current cloud service technologies and management tools for OCCS but there is a need...

  9. PC-1 amino acid variant (K121Q) has no impact on progression of diabetic nephropathy in type 1 diabetic patients

    DEFF Research Database (Denmark)

    Jacobsen, Peter; Grarup, Niels; Tarnow, Lise

    2002-01-01

    Recently, an amino acid variant (K121Q) in the glycoprotein PC-1 (Q allele) has been associated with faster progression of diabetic nephropathy, as estimated by calculated creatinine clearance. We tested the impact of the PC-1 (K121Q) variant on loss of glomerular filtration rate (GFR) measured...

  10. Power Consumption Evaluation of Distributed Computing Network Considering Traffic Locality

    Science.gov (United States)

    Ogawa, Yukio; Hasegawa, Go; Murata, Masayuki

    When computing resources are consolidated in a few huge data centers, a massive amount of data is transferred to each data center over a wide area network (WAN). This results in increased power consumption in the WAN. A distributed computing network (DCN), such as a content delivery network, can reduce the traffic from/to the data center, thereby decreasing the power consumed in the WAN. In this paper, we focus on the energy-saving aspect of the DCN and evaluate its effectiveness, especially considering traffic locality, i.e., the amount of traffic related to the geographical vicinity. We first formulate the problem of optimizing the DCN power consumption and describe the DCN in detail. Then, numerical evaluations show that, when there is strong traffic locality and the router has ideal energy proportionality, the system's power consumption is reduced to about 50% of the power consumed in the case where a DCN is not used; moreover, this advantage becomes even larger (up to about 30%) when the data center is located farthest from the center of the network topology.

  11. MicroRNA Dysregulation, Gene Networks, and Risk for Schizophrenia in 22q11.2 Deletion Syndrome

    OpenAIRE

    Merico, Daniele; Costain, Gregory; Butcher, Nancy J.; Warnica, William; Ogura, Lucas; Alfred, Simon E.; Brzustowicz, Linda M.; Bassett, Anne S.

    2014-01-01

    The role of microRNAs (miRNAs) in the etiology of schizophrenia is increasingly recognized. Microdeletions at chromosome 22q11.2 are recurrent structural variants that impart a high risk for schizophrenia and are found in up to 1% of all patients with schizophrenia. The 22q11.2 deletion region overlaps gene DGCR8, encoding a subunit of the miRNA microprocessor complex. We identified miRNAs overlapped by the 22q11.2 microdeletion and for the first time investigated their predicted target genes...

  12. Correlation between Academic and Skills-Based Tests in Computer Networks

    Science.gov (United States)

    Buchanan, William

    2006-01-01

    Computing-related programmes and modules have many problems, especially related to large class sizes, large-scale plagiarism, module franchising, and an increased requirement from students for increased amounts of hands-on, practical work. This paper presents a practical computer networks module which uses a mixture of online examinations and a…

  13. Potts Model in One-Dimension on Directed Small-World Networks

    Science.gov (United States)

    Aquino, Édio O.; Lima, F. W. S.; Araújo, Ascânio D.; Costa Filho, Raimundo N.

    2018-06-01

    The critical properties of the Potts model with q=3 and 8 states in one-dimension on directed small-world networks are investigated. This disordered system is simulated by updating it with the Monte Carlo heat bath algorithm. The Potts model on these directed small-world networks presents in fact a second-order phase transition with a new set of critical exponents for q=3 considering a rewiring probability p=0.1. For q=8 the system exhibits only a first-order phase transition independent of p.

  14. Genome scan of human systemic lupus erythematosus: Evidence for linkage on chromosome 1q in African-American pedigrees

    Science.gov (United States)

    Moser, Kathy L.; Neas, Barbara R.; Salmon, Jane E.; Yu, Hua; Gray-McGuire, Courtney; Asundi, Neeraj; Bruner, Gail R.; Fox, Jerome; Kelly, Jennifer; Henshall, Stephanie; Bacino, Debra; Dietz, Myron; Hogue, Robert; Koelsch, Gerald; Nightingale, Lydia; Shaver, Tim; Abdou, Nabih I.; Albert, Daniel A.; Carson, Craig; Petri, Michelle; Treadwell, Edward L.; James, Judith A.; Harley, John B.

    1998-01-01

    Systemic lupus erythematosus (SLE) is an autoimmune disorder characterized by production of autoantibodies against intracellular antigens including DNA, ribosomal P, Ro (SS-A), La (SS-B), and the spliceosome. Etiology is suspected to involve genetic and environmental factors. Evidence of genetic involvement includes: associations with HLA-DR3, HLA-DR2, Fcγ receptors (FcγR) IIA and IIIA, and hereditary complement component deficiencies, as well as familial aggregation, monozygotic twin concordance >20%, λs > 10, purported linkage at 1q41–42, and inbred mouse strains that consistently develop lupus. We have completed a genome scan in 94 extended multiplex pedigrees by using model-based linkage analysis. Potential [log10 of the odds for linkage (lod) > 2.0] SLE loci have been identified at chromosomes 1q41, 1q23, and 11q14–23 in African-Americans; 14q11, 4p15, 11q25, 2q32, 19q13, 6q26–27, and 12p12–11 in European-Americans; and 1q23, 13q32, 20q13, and 1q31 in all pedigrees combined. An effect for the FcγRIIA candidate polymorphism) at 1q23 (lod = 3.37 in African-Americans) is syntenic with linkage in a murine model of lupus. Sib-pair and multipoint nonparametric analyses also support linkage (P 2.0). Our results are consistent with the presumed complexity of genetic susceptibility to SLE and illustrate racial origin is likely to influence the specific nature of these genetic effects. PMID:9843982

  15. Self-dual continuous series of representations for U{sub q}(sl(2)) and U{sub q}(osp(1 vertical stroke 2))

    Energy Technology Data Exchange (ETDEWEB)

    Hadasz, Leszek [Krakow Univ. (Poland). Inst. of Physics; Pawelkiewicz, Michal; Schomerus, Volker [DESY Hamburg (Germany). Theory Group

    2013-05-15

    We determine the Clebsch-Gordan and Racah-Wigner coefficients for continuous series of representations of the quantum deformed algebras U{sub q}(sl(2)) and U{sub q}(osp(1 vertical stroke 2)). While our results for the former algebra reproduce formulas by Ponsot and Teschner, the expressions for the orthosymplectic algebra are new. Up to some normalization factors, the associated Racah-Wigner coefficients are shown to agree with the fusing matrix in the Neveu-Schwarz sector of N=1 supersymmetric Liouville field theory.

  16. Spatial Analysis Along Networks Statistical and Computational Methods

    CERN Document Server

    Okabe, Atsuyuki

    2012-01-01

    In the real world, there are numerous and various events that occur on and alongside networks, including the occurrence of traffic accidents on highways, the location of stores alongside roads, the incidence of crime on streets and the contamination along rivers. In order to carry out analyses of those events, the researcher needs to be familiar with a range of specific techniques. Spatial Analysis Along Networks provides a practical guide to the necessary statistical techniques and their computational implementation. Each chapter illustrates a specific technique, from Stochastic Point Process

  17. Computer Networks E-learning Based on Interactive Simulations and SCORM

    Directory of Open Access Journals (Sweden)

    Francisco Andrés Candelas

    2011-05-01

    Full Text Available This paper introduces a new set of compact interactive simulations developed for the constructive learning of computer networks concepts. These simulations, which compose a virtual laboratory implemented as portable Java applets, have been created by combining EJS (Easy Java Simulations with the KivaNS API. Furthermore, in this work, the skills and motivation level acquired by the students are evaluated and measured when these simulations are combined with Moodle and SCORM (Sharable Content Object Reference Model documents. This study has been developed to improve and stimulate the autonomous constructive learning in addition to provide timetable flexibility for a Computer Networks subject.

  18. Proceedings: Distributed digital systems, plant process computers, and networks

    International Nuclear Information System (INIS)

    1995-03-01

    These are the proceedings of a workshop on Distributed Digital Systems, Plant Process Computers, and Networks held in Charlotte, North Carolina on August 16--18, 1994. The purpose of the workshop was to provide a forum for technology transfer, technical information exchange, and education. The workshop was attended by more than 100 representatives of electric utilities, equipment manufacturers, engineering service organizations, and government agencies. The workshop consisted of three days of presentations, exhibitions, a panel discussion and attendee interactions. Original plant process computers at the nuclear power plants are becoming obsolete resulting in increasing difficulties in their effectiveness to support plant operations and maintenance. Some utilities have already replaced their plant process computers by more powerful modern computers while many other utilities intend to replace their aging plant process computers in the future. Information on recent and planned implementations are presented. Choosing an appropriate communications and computing network architecture facilitates integrating new systems and provides functional modularity for both hardware and software. Control room improvements such as CRT-based distributed monitoring and control, as well as digital decision and diagnostic aids, can improve plant operations. Commercially available digital products connected to the plant communications system are now readily available to provide distributed processing where needed. Plant operations, maintenance activities, and engineering analyses can be supported in a cost-effective manner. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database

  19. Computer Network Attack Versus Operational Maneuver from the Sea

    National Research Council Canada - National Science Library

    Herdegen, Dale

    2000-01-01

    ...) vulnerable to computer network attack (CNA). Mission command and control can reduce the impact of the loss of command and control, but it can not overcome the vast and complex array of threats...

  20. Predictive Behavior of a Computational Foot/Ankle Model through Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Ruchi D. Chande

    2017-01-01

    Full Text Available Computational models are useful tools to study the biomechanics of human joints. Their predictive performance is heavily dependent on bony anatomy and soft tissue properties. Imaging data provides anatomical requirements while approximate tissue properties are implemented from literature data, when available. We sought to improve the predictive capability of a computational foot/ankle model by optimizing its ligament stiffness inputs using feedforward and radial basis function neural networks. While the former demonstrated better performance than the latter per mean square error, both networks provided reasonable stiffness predictions for implementation into the computational model.