771 resultados para Redundant manipulators
Resumo:
Understanding the process of cell division is crucial for modern cancer medicine due to the central role of uncontrolled cell division in this disease. Cancer involves unrestrained proliferation as a result of cells loosing normal control and being driven through the cell cycle, where they normally would be non-dividing or quiescent. Progression through the cell cycle is thought to be dependent on the sequential activation of cyclin-dependent kinases (Cdks). The full activation of Cdks requires the phosphorylation of a conserved residue (threonine-160 on human Cdk2) on the T-loop of the kinase domain. In metazoan species, a trimeric complex consisting of Cdk7, cyclin H and Mat1 has been suggested to be the T-loop kinase of several Cdks. In addition, Cdk7 have also been implicated in the regulation of transcription. Cdk7, cyclin H, and Mat1 can be found as subunits of general transcription factor TFIIH. Cdk7, in this context, phosphorylates the Carboxy-terminal domain (CTD) of the large subunit of RNA polymerase II (RNA pol II), specifically on serine-5 residues of the CTD repeat. The regulation of Cdk7 in these and other functions is not well known and the unambiguous characterization of the in vivo role of Cdk7 in both T-loop activation and CTD serine-5 phosphorylation has proved challenging. In this study, the fission yeast Cdk7-cyclin H homologous complex, Mcs6-Mcs2, is identified as the in vivo T-loop kinase of Cdk1(Cdc2). It also identifies multiple levels of regulation of Mcs6 kinase activity, i.e. association with Pmh1, a novel fission yeast protein that is the apparent homolog of metazoan Mat1, and T-loop phosphorylation of Mcs6, mediated by Csk1, a monomeric T-loop kinase with similarity to Cak1 of budding yeast. In addition, Skp1, a component of the SCF (Skp1-Cullin-F box protein) ubiquitin ligase is identified by its interactions with Mcs2 and Pmh1. The Skp1 association with Mcs2 and Pmh1 is however SCF independent and does not involve proteolytic degradation but may reflect a novel mechanism to modulate the activity or complex assembly of Mcs6. In addition to Cdk7, also Cdk8 has been shown to have CTD serine-5 kinase activity in vitro. Cdk8 is not essential in yeast but has been shown to function as a transcriptional regulator. The function of Cdk8 is unknown in flies and mammals. This prompted the investigation of murine Cdk8 and its potential role as a redundant CTD serine-5 kinase. We find that Cdk8 is required for development prior to implantation, at a time that is co-incident with a burst of Cdk8 expression during normal development. The results does not support a role of Cdk8 as a serine-5 CTD kinase in vivo but rather shows an unexpected requirement for Cdk8, early in mammalian development. The results presented in this thesis extends our current knowledge of the regulation of the cell cycle by characterizing the function of two distinct cell cycle regulating T-loop kinases, including the unambiguous identification of Mcs6, the fission yeast Cdk7 homolog, as the T-loop kinase of Cdk1. The results also indicate that the function of Mcs6 is conserved from fission yeast to human Cdk7 and suggests novel mechanisms by which the distinct functions of Cdk7 and Mcs6 could be regulated. These findings are important for our understanding of how progression of the cell cycle and proper transcription is controlled, during normal development and tissue homeostasis but also under condition where cells have escaped these control mechanisms e.g. cancer.
Resumo:
The existing internet computing resource, Biomolecules Segment Display Device (BSDD), has been updated with several additional useful features. An advanced option is provided to superpose the structural motifs obtained from a search on the Protein Data Bank (PDB) in order to see if the three-dimensional structures adopted by identical or similar sequence motifs are the same. Furthermore, the options to display structural aspects like inter- and intra-molecular interactions, ion-pairs, disulphide bonds, etc. have been provided.The updated resource is interfaced with an up-to-date copy of the public domain PDB as well as 25 and 90% non-redundant protein structures. Further, users can upload the three-dimensional atomic coordinates (PDB format) from the client machine. A free molecular graphics program, JMol, is interfaced with it to display the three-dimensional structures.
Resumo:
The studies presented in this thesis contribute to the understanding of evolutionary ecology of three major viruses threatening cultivated sweetpotato (Ipomoea batatas Lam) in East Africa: Sweet potato feathery mottle virus (SPFMV; genus Potyvirus; Potyviridae), Sweet potato chlorotic stunt virus (SPCSV; genus Crinivirus; Closteroviridae) and Sweet potato mild mottle virus (SPMMV; genus Ipomovirus; Potyviridae). The viruses were serologically detected and the positive results confirmed by RT-PCR and sequencing. SPFMV was detected in 24 wild plant species of family Convolvulacea (genera Ipomoea, Lepistemon and Hewittia), of which 19 species were new natural hosts for SPFMV. SPMMV and SPCSV were detected in wild plants belonging to 21 and 12 species (genera Ipomoea, Lepistemon and Hewittia), respectively, all of which were previously unknown to be natural hosts of these viruses. SPFMV was the most abundant virus being detected in 17% of the plants, while SPMMV and SPCSV were detected in 9.8% and 5.4% of the assessed plants, respectively. Wild plants in Uganda were infected with the East African (EA), common (C), and the ordinary (O) strains, or co-infected with the EA and the C strain of SPFMV. The viruses and virus-like diseases were more frequent in the eastern agro-ecological zone than the western and central zones, which contrasted with known incidences of these viruses in sweetpotato crops, except for northern zone where incidences were lowest in wild plants as in sweetpotato. The NIb/CP junction in SPMMV was determined experimentally which facilitated CP-based phylogenetic and evolutionary analyses of SPMMV. Isolates of all the three viruses from wild plants were genetically similar to those found in cultivated sweetpotatoes in East Africa. There was no evidence of host-driven population genetic structures suggesting frequent transmission of these viruses between their wild and cultivated hosts. The p22 RNA silencing suppressor-encoding sequence was absent in a few SPCSV isolates, but regardless of this, SPCSV isolates incited sweet potato virus disease (SPVD) in sweetpotato plants co-infected with SPFMV, indicating that p22 is redundant for synergism between SCSV and SPFMV. Molecular evolutionary analysis revealed that isolates of strain EA of SPFMV that is largely restricted geographically in East Africa experience frequent recombination in comparison to isolates of strain C that is globally distributed. Moreover, non-homologous recombination events between strains EA and C were rare, despite frequent co-infections of these strains in wild plants, suggesting purifying selection against non-homologous recombinants between these strains or that such recombinants are mostly not infectious. Recombination was detected also in the 5 - and 3 -proximal regions of the SPMMV genome providing the first evidence of recombination in genus Ipomovirus, but no recombination events were detected in the characterized genomic regions of SPCSV. Strong purifying selection was implicated on evolution of majority of amino acids of the proteins encoded by the analyzed genomic regions of SPFMV, SPMMV and SPCSV. However, positive selection was predicted on 17 amino acids distributed over the whole the coat protein (CP) in the globally distributed strain C, as compared to only 4 amino acids in the multifunctional CP N-terminus (CP-NT) of strain EA largely restricted geographically to East Africa. A few amino acid sites in the N-terminus of SPMMV P1, the p7 protein and RNA silencing suppressor proteins p22 and RNase3 of SPCSV were also submitted to positive selection. Positively selected amino acids may constitute ligand-binding domains that determine interactions with plant host and/or insect vector factors. The P1 proteinase of SPMMV (genus Ipomovirus) seems to respond to needs of adaptation, which was not observed with the helper component proteinase (HC-Pro) of SPMMV, although the HC-Pro is responsible for many important molecular interactions in genus Potyvirus. Because the centre of origin of cultivated sweetpotato is in the Americas from where the crop was dispersed to other continents in recent history (except for the Australasia and South Pacific region), it would be expected that identical viruses and their strains occur worldwide, presuming virus dispersal with the host. Apparently, this seems not to be the case with SPMMV, the strain EA of SPFMV and the strain EA of SPCSV that are largely geographically confined in East Africa where they are predominant and occur both in natural and agro-ecosystems. The geographical distribution of plant viruses is constrained more by virus-vector relations than by virus-host interactions, which in accordance of the wide range of natural host species and the geographical confinement to East Africa suggest that these viruses existed in East African wild plants before the introduction of sweetpotato. Subsequently, these studies provide compelling evidence that East Africa constitutes a cradle of SPFMV strain EA, SPCSV strain EA, and SPMMV. Therefore, sweet potato virus disease (SPVD) in East Africa may be one of the examples of damaging virus diseases resulting from exchange of viruses between introduced crops and indigenous wild plant species. Keywords: Convolvulaceae, East Africa, epidemiology, evolution, genetic variability, Ipomoea, recombination, SPCSV, SPFMV, SPMMV, selection pressure, sweetpotato, wild plant species Author s Address: Arthur K. Tugume, Department of Agricultural Sciences, Faculty of Agriculture and Forestry, University of Helsinki, Latokartanonkaari 7, P.O Box 27, FIN-00014, Helsinki, Finland. Email: tugume.arthur@helsinki.fi Author s Present Address: Arthur K. Tugume, Department of Botany, Faculty of Science, Makerere University, P.O. Box 7062, Kampala, Uganda. Email: aktugume@botany.mak.ac.ug, tugumeka@yahoo.com
Resumo:
This paper describes the application of vector spaces over Galois fields, for obtaining a formal description of a picture in the form of a very compact, non-redundant, unique syntactic code. Two different methods of encoding are described. Both these methods consist in identifying the given picture as a matrix (called picture matrix) over a finite field. In the first method, the eigenvalues and eigenvectors of this matrix are obtained. The eigenvector expansion theorem is then used to reconstruct the original matrix. If several of the eigenvalues happen to be zero this scheme results in a considerable compression. In the second method, the picture matrix is reduced to a primitive diagonal form (Hermite canonical form) by elementary row and column transformations. These sequences of elementary transformations constitute a unique and unambiguous syntactic code-called Hermite code—for reconstructing the picture from the primitive diagonal matrix. A good compression of the picture results, if the rank of the matrix is considerably lower than its order. An important aspect of this code is that it preserves the neighbourhood relations in the picture and the primitive remains invariant under translation, rotation, reflection, enlargement and replication. It is also possible to derive the codes for these transformed pictures from the Hermite code of the original picture by simple algebraic manipulation. This code will find extensive applications in picture compression, storage, retrieval, transmission and in designing pattern recognition and artificial intelligence systems.
Resumo:
Pangasianodon hypophthalmus is a commercially important freshwater fish used in inland aquaculture in the Mekong Delta, Vietnam. The current study using Ion Torrent technology generated EST resources from the kidney for Tra catfish reared at a salinity level of 9 ppt. We obtained 2,623,929 reads after trimming and processing with an average length of 104 bp. De novo assemblies were generated using CLC Genomic Workbench, Trinity and Velvet/Oases with the best overall contig performance resulting from the CLC assembly. De novo assembly using CLC yielded 29,940 contigs, and allowing identification of 5,710 putative genes when comppared with NCBI non-redundant database. A large number of single nucleotide polymorphisms (SNPs) were also detected. The sequence collection generated in our study represents the most comprehensive transcriptomic resource for P. hypophthalmus available to date.
Resumo:
In recent years, XML has been widely adopted as a universal format for structured data. A variety of XML-based systems have emerged, most prominently SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This popularity is helped by the excellent support for XML processing in many programming languages and by the variety of XML-based technologies for more complex needs of applications. Concurrently with this rise of XML, there has also been a qualitative expansion of the Internet's scope. Namely, mobile devices are becoming capable enough to be full-fledged members of various distributed systems. Such devices are battery-powered, their network connections are based on wireless technologies, and their processing capabilities are typically much lower than those of stationary computers. This dissertation presents work performed to try to reconcile these two developments. XML as a highly redundant text-based format is not obviously suitable for mobile devices that need to avoid extraneous processing and communication. Furthermore, the protocols and systems commonly used in XML messaging are often designed for fixed networks and may make assumptions that do not hold in wireless environments. This work identifies four areas of improvement in XML messaging systems: the programming interfaces to the system itself and to XML processing, the serialization format used for the messages, and the protocol used to transmit the messages. We show a complete system that improves the overall performance of XML messaging through consideration of these areas. The work is centered on actually implementing the proposals in a form usable on real mobile devices. The experimentation is performed on actual devices and real networks using the messaging system implemented as a part of this work. The experimentation is extensive and, due to using several different devices, also provides a glimpse of what the performance of these systems may look like in the future.
Resumo:
Analyzing statistical dependencies is a fundamental problem in all empirical science. Dependencies help us understand causes and effects, create new scientific theories, and invent cures to problems. Nowadays, large amounts of data is available, but efficient computational tools for analyzing the data are missing. In this research, we develop efficient algorithms for a commonly occurring search problem - searching for the statistically most significant dependency rules in binary data. We consider dependency rules of the form X->A or X->not A, where X is a set of positive-valued attributes and A is a single attribute. Such rules describe which factors either increase or decrease the probability of the consequent A. A classical example are genetic and environmental factors, which can either cause or prevent a disease. The emphasis in this research is that the discovered dependencies should be genuine - i.e. they should also hold in future data. This is an important distinction from the traditional association rules, which - in spite of their name and a similar appearance to dependency rules - do not necessarily represent statistical dependencies at all or represent only spurious connections, which occur by chance. Therefore, the principal objective is to search for the rules with statistical significance measures. Another important objective is to search for only non-redundant rules, which express the real causes of dependence, without any occasional extra factors. The extra factors do not add any new information on the dependence, but can only blur it and make it less accurate in future data. The problem is computationally very demanding, because the number of all possible rules increases exponentially with the number of attributes. In addition, neither the statistical dependency nor the statistical significance are monotonic properties, which means that the traditional pruning techniques do not work. As a solution, we first derive the mathematical basis for pruning the search space with any well-behaving statistical significance measures. The mathematical theory is complemented by a new algorithmic invention, which enables an efficient search without any heuristic restrictions. The resulting algorithm can be used to search for both positive and negative dependencies with any commonly used statistical measures, like Fisher's exact test, the chi-squared measure, mutual information, and z scores. According to our experiments, the algorithm is well-scalable, especially with Fisher's exact test. It can easily handle even the densest data sets with 10000-20000 attributes. Still, the results are globally optimal, which is a remarkable improvement over the existing solutions. In practice, this means that the user does not have to worry whether the dependencies hold in future data or if the data still contains better, but undiscovered dependencies.
Resumo:
This thesis studies optimisation problems related to modern large-scale distributed systems, such as wireless sensor networks and wireless ad-hoc networks. The concrete tasks that we use as motivating examples are the following: (i) maximising the lifetime of a battery-powered wireless sensor network, (ii) maximising the capacity of a wireless communication network, and (iii) minimising the number of sensors in a surveillance application. A sensor node consumes energy both when it is transmitting or forwarding data, and when it is performing measurements. Hence task (i), lifetime maximisation, can be approached from two different perspectives. First, we can seek for optimal data flows that make the most out of the energy resources available in the network; such optimisation problems are examples of so-called max-min linear programs. Second, we can conserve energy by putting redundant sensors into sleep mode; we arrive at the sleep scheduling problem, in which the objective is to find an optimal schedule that determines when each sensor node is asleep and when it is awake. In a wireless network simultaneous radio transmissions may interfere with each other. Task (ii), capacity maximisation, therefore gives rise to another scheduling problem, the activity scheduling problem, in which the objective is to find a minimum-length conflict-free schedule that satisfies the data transmission requirements of all wireless communication links. Task (iii), minimising the number of sensors, is related to the classical graph problem of finding a minimum dominating set. However, if we are not only interested in detecting an intruder but also locating the intruder, it is not sufficient to solve the dominating set problem; formulations such as minimum-size identifying codes and locating dominating codes are more appropriate. This thesis presents approximation algorithms for each of these optimisation problems, i.e., for max-min linear programs, sleep scheduling, activity scheduling, identifying codes, and locating dominating codes. Two complementary approaches are taken. The main focus is on local algorithms, which are constant-time distributed algorithms. The contributions include local approximation algorithms for max-min linear programs, sleep scheduling, and activity scheduling. In the case of max-min linear programs, tight upper and lower bounds are proved for the best possible approximation ratio that can be achieved by any local algorithm. The second approach is the study of centralised polynomial-time algorithms in local graphs these are geometric graphs whose structure exhibits spatial locality. Among other contributions, it is shown that while identifying codes and locating dominating codes are hard to approximate in general graphs, they admit a polynomial-time approximation scheme in local graphs.
Resumo:
Pseudomonas aeruginosa tRNA was treated with iodine, CNBr and N-ethylmaleimide,three thionucleotide-specific reagents. Reaction with iodine resulted in extensive loss of acceptor activity by lysine tRNA, glutamic acid tRNA, glutamine tRNA, serine tRNA and tyrosine tRNA. CNBr treatment resulted in high loss of acceptor ability by lysine tRNA, glutamic acid tRNA and glutamine tRNA. Only the acceptor ability of tyrosine tRNA was inhibited up to 66% by N-ethylmaleimide treatment, a reagent specific for 4-thiouridine. By the combined use of benzoylated DEAE-cellulose and DEAESephadex columns, lysine tRNA of Ps. aeruginosa was resolved into two isoaccepting species, a major, tRNAL'y and a minor, tRNA'Ys. Co-chromatography of 14C-labelled tRNALYS and 3H-labelled tRNALy, on benzoylated DEAE-cellulose at pH4.5 gave two distinct, non-superimposable profiles for the two activity peaks, suggesting that they were separate species. The acceptor activity of these two species was inhibited by about 95% by iodine and CNBr. Both the species showed equal response to codons AAA and AAG and also for poly(A) and poly(A1,Gl) suggesting that the anticodon of these species was UUU. Chemical modification of these two species by iodine did not inhibit the coding response. The two species of lysine of Ps. aeruginosa are truly redundant in that they are indistinguishable either by chemical modification or by their coding response.
Resumo:
Prospective studies and intervention evaluations that examine change over time assume that measurement tools measure the same construct at each occasion. In the area of parent-child feeding practices, longitudinal measurement properties of the questionnaires used are rarely verified. To ascertain that measured change in feeding practices reflects true change rather than change in the assessment, structure, or conceptualisation of the constructs over time, this study examined longitudinal measurement invariance of the Feeding Practices and Structure Questionnaire (FPSQ) subscales (9 constructs; 40 items) across 3 time points. Mothers participating in the NOURISH trial reported their feeding practices when children were aged 2, 3.7, and 5 years (N = 404). Confirmatory Factor Analysis (CFA) within a structural equation modelling framework was used. Comparisons of initial cross-sectional models followed by longitudinal modelling of subscales, resulted in the removal of 12 items, including two redundant or poorly performing subscales. The resulting 28-item FPSQ-28 comprised 7 multi-item subscales: Reward for Behaviour, Reward for Eating, Persuasive Feeding, Overt Restriction, Covert Restriction, Structured Meal Setting and Structured Meal Timing. All subscales showed good fit over 3 time points and each displayed at least partial scalar (thresholds equal) longitudinal measurement invariance. We recommend the use of a separate single item indicator to assess the family meal setting. This is the first study to examine longitudinal measurement invariance in a feeding practices questionnaire. Invariance was established, indicating that the subscales of the shortened FPSQ-28 can be used with mothers to validly assess change in 7 feeding constructs in samples of children aged 2-5 years of age.
Resumo:
In What We Owe to Each Other, T.M. Scanlon formulated a new version of the ethical theory called contractualism. This theory took reasons considerations that count in favour of judgment-sensitive attitudes to be the fundamental normative notion. It then used normative reasons to first account for evaluative properties. For an object to be valuable, on this view, is for it to have properties that provide reasons to have favourable attitudes towards the bearer of value. Scanlon also used reasons to account for moral wrongness. His contractualism claims that an act is morally wrong if it is forbidden by any set of moral principles that no one could reasonably reject. My thesis consists of five previously published articles which attempt to clarify Scanlon s theory and to defend it against its critics. The first article defends the idea that normative reason-relations are fundamental against Joshua Gert. Gert argues that rationality is a more basic notion than reasons and that reasons can be analysed in terms of their rationally requiring and justifying dimensions. The second article explores the relationship between value and reasons. It defends Scanlon s view according to which reasons are the more basic than value against those who think that reasons are based on the evaluative realm. The last three articles defend Scanlon s views about moral wrongness. The first one of them discusses a classic objection to contractualist theories. This objection is that principles which no one could reasonably reject are redundant in accounting for wrongness. This is because we need a prior notion of wrongness to select those principles and because such principles are not required to make actions wrong or to provide reasons against wrong actions. The fourth article explores the distinctive reasons which contractualists claim there are for avoiding the wrong actions. The last article argues against the critics of contractualism who claim that contractualism has implausible normative consequences for situations related to the treatment of different-sized groups of people.
Resumo:
This paper is concerned with the reliability optimization of a spatially redundant system, subject to various constraints, by using nonlinear programming. The constrained optimization problem is converted into a sequence of unconstrained optimization problems by using a penalty function. The new problem is then solved by the conjugate gradient method. The advantages of this method are highlighted.
Resumo:
There is a growing interest to autonomously collect or manipulate objects in remote or unknown environments, such as mountains, gullies, bush-land, or rough terrain. There are several limitations of conventional methods using manned or remotely controlled aircraft. The capability of small Unmanned Aerial Vehicles (UAV) used in parallel with robotic manipulators could overcome some of these limitations. By enabling the autonomous exploration of both naturally hazardous environments, or areas which are biologically, chemically, or radioactively contaminated, it is possible to collect samples and data from such environments without directly exposing personnel to such risks. This paper covers the design, integration, and initial testing of a framework for outdoor mobile manipulation UAV. The framework is designed to allow further integration and testing of complex control theories, with the capability to operate outdoors in unknown environments. The results obtained act as a reference for the effectiveness of the integrated sensors and low-level control methods used for the preliminary testing, as well as identifying the key technologies needed for the development of an outdoor capable system.
Resumo:
The actin cytoskeleton is essential for many cellular processes, including motility, morphogenesis, endocytosis and signal transduction. Actin can exist in monomeric (G-actin) or filamentous (F-actin) form. Actin filaments are considered to be the functional form of actin, generating the protrusive forces characteristic for the actin cytoskeleton. The structure and dynamics of the actin filament and monomer pools are regulated by a large number of actin-binding proteins in eukaryotic cells. Twinfilin is an evolutionarily conserved small actin monomer binding protein. Twinfilin is composed of two ADF/cofilin-like domains, separated by a short linker and followed by a C-terminal tail. Twinfilin forms a stable, high affinity complex with ADP-G-actin, inhibits the nucleotide exchange on actin monomers, and prevents their assembly into filament ends. Twinfilin was originally identified from yeast and has since then been found from all organisms studied except plants. Not much was known about the role of twinfilin in the actin dynamics in mammalian cells before this study. We set out to unravel the mysteries still covering twinfilins functions using biochemistry, cell biology, and genetics. We identified and characterized two mouse isoforms for the previously identified mouse twinfilin-1. The new isoforms, twinfilin-2a and -2b, are generated from the same gene through alternative promoter usage. The three isoforms have distinctive expression patterns, but are similar biochemically. Twinfilin-1 is the major isoform during development and is expressed in high levels in almost all tissues examined. Twinfilin-2a is also expressed almost ubiquitously, but at lower levels. Twinfilin-2b turned out to be a muscle-specific isoform, with very high expression in heart and skeletal muscle. It seems all mouse tissues express at least two twinfilin isoforms, indicating that twinfilins are important regulators of actin dynamics in all cell and tissue types. A knockout mouse line was generated for twinfilin-2a. The mice homozygous for this knockout were viable and developed normally, indicating that twinfilin-2a is dispensable for mouse development. However, it is important to note that twinfilin-2a shows similar expression pattern to twinfilin-1, suggesting that these proteins play redundant roles in mice. All mouse isoforms were shown to be able to sequester actin filaments and have higher affinity for ADP-G-actin than ATP-G-actin. They are also able to directly interact with heterodimeric capping protein and PI(4,5)P2 similar to yeast twinfilin. In this study we also uncovered a novel function for mouse twinfilins; capping actin filament barbed ends. All mouse twinfilin isoforms were shown to possess this function, while yeast and Drosophila twinfilin were not able to cap filament barbed ends. Twinfilins localize to the cytoplasm but also to actin-rich regions in mammalian cells. The subcellular localizations of the isoforms are regulated differently, indicating that even though twinfilins biochemical functions in vitro are very similar, in vivo they can play different roles through different regulatory pathways. Together, this study show that twinfilins regulate actin filament assembly both by sequestering actin monomers and by capping filament barbed ends, and that mammals have three biochemically similar twinfilin isoforms with partially overlapping expression patterns.
Resumo:
Multi-document summarization addressing the problem of information overload has been widely utilized in the various real-world applications. Most of existing approaches adopt term-based representation for documents which limit the performance of multi-document summarization systems. In this paper, we proposed a novel pattern-based topic model (PBTMSum) for the task of the multi-document summarization. PBTMSum combining pattern mining techniques with LDA topic modelling could generate discriminative and semantic rich representations for topics and documents so that the most representative and non-redundant sentences can be selected to form a succinct and informative summary. Extensive experiments are conducted on the data of document understanding conference (DUC) 2007. The results prove the effectiveness and efficiency of our proposed approach.