88 resultados para sets of words
Resumo:
The serendipitous observation of a C-H...O hydrogen bond mediated polypeptide chain reversal in synthetic peptide helices has led to a search for the occurrence of a similar motif in protein structures. From a dataset of 634 proteins, 1304 helices terminating in a Schellman motif have been examined. The C-H...O interaction between the T - 4 (CH)-H-alpha and T + 1 C=O group (C...O 3.5 Angstrom) becomes possible only when the T + 1 residue adopts an extended beta conformation (T is defined as the helix terminating residue adopting an alpha(L) conformation). In all, 111 examples of this chain reversal motif have been identified and the compositional and conformational. preferences at positions T - 4, T, and T + 1 determined. A marked preference for residues like Set, Glu and Gln is observed at T - 4 position with the motif being further stabilized by the formation of a side-chain-backbone O...H-N hydrogen bond involving the side-chain of residue T - 4 and the N-H group of residue T + 3. In as many as 57 examples, the segment following the helix was extended with three to four successive residues in beta conformation. In a majority of these cases, the succeeding beta strand lies approximately antiparallel with the helix, suggesting that the backbone C-H...O interactions may provide a means of registering helices and strands in an antiparallel orientation. Two examples were identified in which extended registry was detected with two sets of C-H...O hydrogen bonds between (T - 4) (CH)-H-alpha...C=O (T + 1) and (T - 8) (CH)-H-alpha...C=O (T + 3). 0 2002 Published by Elsevier Science Ltd.
Resumo:
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level helps in designing efficient storage systems. Second, it helps create benchmarks that mimic realistic application behavior closely. Third, it enables autonomic systems as the information obtained can be used to adapt the system in a closed loop.All these use cases require the ability to extract the application-level semantics of I/O operations. Methods such as modifying application code to associate I/O operations with semantic tags are intrusive. It is well known that network file system traces are an important source of information that can be obtained non-intrusively and analyzed either online or offline. These traces are a sequence of primitive file system operations and their parameters. Simple counting, statistical analysis or deterministic search techniques are inadequate for discovering application-level semantics in the general case, because of the inherent variation and noise in realistic traces.In this paper, we describe a trace analysis methodology based on Profile Hidden Markov Models. We show that the methodology has powerful discriminatory capabilities that enable it to recognize applications based on the patterns in the traces, and to mark out regions in a long trace that encapsulate sets of primitive operations that represent higher-level application actions. It is robust enough that it can work around discrepancies between training and target traces such as in length and interleaving with other operations. We demonstrate the feasibility of recognizing patterns based on a small sampling of the trace, enabling faster trace analysis. Preliminary experiments show that the method is capable of learning accurate profile models on live traces in an online setting. We present a detailed evaluation of this methodology in a UNIX environment using NFS traces of selected commonly used applications such as compilations as well as on industrial strength benchmarks such as TPC-C and Postmark, and discuss its capabilities and limitations in the context of the use cases mentioned above.
Resumo:
Background: Sensitive remote homology detection and accurate alignments especially in the midnight zone of sequence similarity are needed for better function annotation and structural modeling of proteins. An algorithm, AlignHUSH for HMM-HMM alignment has been developed which is capable of recognizing distantly related domain families The method uses structural information, in the form of predicted secondary structure probabilities, and hydrophobicity of amino acids to align HMMs of two sets of aligned sequences. The effect of using adjoining column(s) information has also been investigated and is found to increase the sensitivity of HMM-HMM alignments and remote homology detection. Results: We have assessed the performance of AlignHUSH using known evolutionary relationships available in SCOP. AlignHUSH performs better than the best HMM-HMM alignment methods and is observed to be even more sensitive at higher error rates. Accuracy of the alignments obtained using AlignHUSH has been assessed using the structure-based alignments available in BaliBASE. The alignment length and the alignment quality are found to be appropriate for homology modeling and function annotation. The alignment accuracy is found to be comparable to existing methods for profile-profile alignments. Conclusions: A new method to align HMMs has been developed and is shown to have better sensitivity at error rates of 10% and above when compared to other available programs. The proposed method could effectively aid obtaining clues to functions of proteins of yet unknown function. A web-server incorporating the AlignHUSH method is available at http://crick.mbu.iisc.ernet.in/similar to alignhush/
Resumo:
We present a simplified theory of carrier backscattering coefficient in a twofold degenerate asymmetric bilayer graphene nanoribbon (BGN) under the application of a low static electric field. We show that for a highly asymmetric BGN(Delta = gamma), the density of states in the lower subband increases more that of the upper, in which Delta and gamma are the gap and the interlayer coupling constant, respectively. We also demonstrate that under the acoustic phonon scattering regime, the formation of two distinct sets of energy subbands signatures a quantized transmission coefficient as a function of ribbon width and provides an extremely low carrier reflection coefficient for a better Landauer conductance even at room temperature. The well-known result for the ballistic condition has been obtained as a special case of the present analysis under certain limiting conditions which forms an indirect validation of our theoretical formalism.
Resumo:
The impact of realistic representation of sea surface temperature (SST) on the numerical simulation of track and intensity of tropical cyclones formed over the north Indian Ocean is studied using the Weather Research and Forecast (WRF) model. We have selected two intense tropical cyclones formed over the Bay of Bengal for studying the SST impact. Two different sets of SSTs were used in this study: one from TRMM Microwave Imager (TMI) satellite and other is the weekly averaged Reynold's SST analysis from National Center for Environmental Prediction (NCEP). WRF simulations were conducted using the Reynold's and TMI SST as model boundary condition for the two cyclone cases selected. The TMI SST which has a better temporal and spatial resolution showed sharper gradient when compared to the Reynold's SST. The use of TMI SST improved the WRF cyclone intensity prediction when compared to that using Reynold's SST for both the cases studied. The improvements in intensity were mainly due to the improved prediction of surface latent and sensible heat fluxes. The use of TMI SST in place of Reynold's SST improved cyclone track prediction for Orissa super cyclone but slightly degraded track prediction for cyclone Mala. The present modeling study supports the well established notion that the horizontal SST gradient is one of the major driving forces for the intensification and movement of tropical cyclones over the Indian Ocean.
Resumo:
This correspondence presents an algorithm for microprogram control memory width minimization with the bit steering technique. The necessary and sufficient conditions to detect the steerability of two mutually exclusive sets of microcommands are established. The algorithm encodes the microcommands of the sets with a bit steering common part and also extends the theory to multiple (more than two) sets of microcommands.
Resumo:
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation, which is used for the dual purposes of tracking address computations and cache behavior. A simultaneous numeric and pointer analysis using an abstraction for discrete sets of values computes safe approximations of access addresses which are then used to predict cache behavior using Must Analysis. A heuristic is also proposed which generates likely worst case estimates. It can be used in soft real time systems and also for reasoning about the tightness of the safe estimate. The analysis methods can handle programs with non-affine access patterns, for which conventional Presburger Arithmetic formulations or Cache Miss Equations do not apply. The precision of the estimates is user-controlled and can be traded off against analysis time. Executables are analyzed directly, which, apart from enhancing precision, renders the method language independent.
Resumo:
India already has earned the dubious distinction of being one of the countries with the highest incidence of tuberculosis (TB). The conventional control measures have had little impact on the relentless march of the TB epidemic. Potential solutions to this problem include the development of new drugs and an effective TB vaccine. In this perspective, identification of the mycobacterial components that have important role(s) in the establishment of the infection assumes crucial importance. Mycobacterium tuberculosis is an intracellular pathogen and it resides inside the macrophage, which is considered to be the most important component of the immune system. M. tuberculosis possesses two highly polymorphic sets of genes called the PE and PPE families. These unique families of proteins account for about 10% of the mycobacterial genome and have drawn considerable interest from different schools of M. tuberculosis researchers across the globe. In this review, we discuss the importance of these proteins in the regulation of dendritic cell and macrophage immune-effector functions, as well as the relevance of these proteins in the clinical manifestation of TB. This information may be helpful to better understand the immunological importance of PE/PPE proteins and their roles in mycobacterial virulence. (C) 2011 Elsevier Ltd. All rights reserved.
Resumo:
The purpose of life is to obtain knowledge, use it to live with as much satisfaction as possible, and pass it on with improvements and modifications to the next generation.'' This may sound philosophical, and the interpretation of words may be subjective, yet it is fairly clear that this is what all living organisms--from bacteria to human beings--do in their life time. Indeed, this can be adopted as the information theoretic definition of life. Over billions of years, biological evolution has experimented with a wide range of physical systems for acquiring, processing and communicating information. We are now in a position to make the principles behind these systems mathematically precise, and then extend them as far as laws of physics permit. Therein lies the future of computation, of ourselves, and of life.
Resumo:
This paper describes the efforts at MILE lab, IISc, to create a 100,000-word database each in Kannada and Tamil for the design and development of Online Handwritten Recognition. It has been collected from over 600 users in order to capture the variations in writing style. We describe features of the scripts and how the number of symbols were reduced to be able to effectively train the data for recognition. The list of words include all the characters, Kannada and Indo-Arabic numerals, punctuations and other symbols. A semi-automated tool for the annotation of data from stroke to word level is used. It segments each word into stroke groups and also acts as a validation mechanism for segmentation. The tool displays the stroke, stroke groups and aksharas of a word and hence can be used to study the various styles of writing, delayed strokes and for assigning quality tags to the words. The tool is currently being used for annotating Tamil and Kannada data. The output is stored in a standard XML format.
Resumo:
Optical parameters of chalcogenide glass multilayers with 12–15 nm modulation lengths prepared by thermal evaporation can be changed by laser irradiation. Photoluminescence (PL) studies were carried out on such nonirradiated and irradiated multilayered samples of a-Se/As2S3 (sublayer thickness of a-Se is 4–5 nm for one set of samples and 1–2 nm for the other set. However As2S3 sublayer thickness is 11–12 nm for both sets of samples.) PL intensity can be increased by several orders of magnitude by reducing the Se well layer (lower band gap) thickness and can be further increased by irradiating the samples with appropriate wavelengths in the range of the absorption edge. The broadening of luminescence bands takes place either with a decrease in Se layer thickness or with irradiation. The former is due to the change in interface roughness and defects because of the enhanced structural disorder while the latter is due to photoinduced interdiffusion. The photoinduced interdiffusion creates defects at the interface between Se and As2S3 by forming an As–Se–S solid solution. From the deconvoluted PL spectrum, it is shown that the peak PL intensity, full width half maximum, and the PL quantum efficiency of particular defects giving rise to PL, can be tuned by changing the sublayer thickness or by interdiffusion.
Resumo:
With the increasing use of extra high-voltage transmission in power system expansion, the manufacturers of power apparatus and the electric utilities are studying the nature of overvoltages in power systems due to lightning and, in particular, switching operations. For such analyses, knowledge of the natural frequencies of the windings of transformers under a wide variety of conditions is important. The work reported by the author in a previous paper is extended and equivalent circuits have been developed to represent several sets of terminal conditions. These equivalent circuits can be used to determine the natural frequencies and transient voltages in the windings. Comparison of the measured and the computed results obtained with a model transformer indicates that they are in good agreement. Hence, this method of analysis provides a satisfactory procedure for the estimation of natural frequencies and transient voltages in transformer windings.
Resumo:
Accurate estimation of mass transport parameters is necessary for overall design and evaluation processes of the waste disposal facilities. The mass transport parameters, such as effective diffusion coefficient, retardation factor and diffusion accessible porosity, are estimated from observed diffusion data by inverse analysis. Recently, particle swarm optimization (PSO) algorithm has been used to develop inverse model for estimating these parameters that alleviated existing limitations in the inverse analysis. However, PSO solver yields different solutions in successive runs because of the stochastic nature of the algorithm and also because of the presence of multiple optimum solutions. Thus the estimated mean solution from independent runs is significantly different from the best solution. In this paper, two variants of the PSO algorithms are proposed to improve the performance of the inverse analysis. The proposed algorithms use perturbation equation for the gbest particle to gain information around gbest region on the search space and catfish particles in alternative iterations to improve exploration capabilities. Performance comparison of developed solvers on synthetic test data for two different diffusion problems reveals that one of the proposed solvers, CPPSO, significantly improves overall performance with improved best, worst and mean fitness values. The developed solver is further used to estimate transport parameters from 12 sets of experimentally observed diffusion data obtained from three diffusion problems and compared with published values from the literature. The proposed solver is quick, simple and robust on different diffusion problems. (C) 2012 Elsevier Ltd. All rights reserved.
Resumo:
We show that a large class of Cantor-like sets of R-d, d >= 1, contains uncountably many badly approximable numbers, respectively badly approximable vectors, when d >= 2. An analogous result is also proved for subsets of R-d arising in the study of geodesic flows corresponding to (d+1)-dimensional manifolds of constant negative curvature and finite volume, generalizing the set of badly approximable numbers in R. Furthermore, we describe a condition on sets, which is fulfilled by a large class, ensuring a large intersection with these Cantor-like sets.
Resumo:
Structural adhesive bonding is widely used to execute assemblies in automobile and aerospace structures. The quality and reliability of these bonded joints must be ensured during service. In this context non destructive evaluation of these bonded structures play an important role. Evaluation of adhesively bonded composite single lap shear joints has been attempted through experimental approach. Series of tests, non-destructive as well as destructive were performed on different sets of carbon fiber reinforced polymer (CFRP) composite lap joint specimens with varied bond quality. Details of the experimental investigations carried out and the outcome are presented in this paper.