997 resultados para Membrane Computing
Resumo:
The rate of NADH oxidation with oxygen as the acceptor is very low in mouse liver plasma membrane and erythrocyte membrane. When vanadate is added, this rate is stimulated 10- to 20-fold. The absorption spectrum of vanadate does not change with the disappearance of NADH. The reaction is inhibited by superoxide dismutase, and there is no activity under an argon atmosphere. This indicates that oxygen is the electron acceptor and the reaction is mediated by superoxide. The vanadate stimulation is not limited to plasma membrane. Golgi apparatus and endoplasmic reticulum show similar increase in NADH oxidase activity when vanadate is added. The endomembranes have significant vanadate-stimulated activity with both NADH and NADPH. The vanadate-stimulated NADH oxidase in plasma membrane is inhibited by compounds, which inhibit NADH dehydrogenase activity: catechols, anthracycline drugs and manganese. This activity is stimulated by high phosphate and sulfate anion concentrations.
Resumo:
Minimum Description Length (MDL) is an information-theoretic principle that can be used for model selection and other statistical inference tasks. There are various ways to use the principle in practice. One theoretically valid way is to use the normalized maximum likelihood (NML) criterion. Due to computational difficulties, this approach has not been used very often. This thesis presents efficient floating-point algorithms that make it possible to compute the NML for multinomial, Naive Bayes and Bayesian forest models. None of the presented algorithms rely on asymptotic analysis and with the first two model classes we also discuss how to compute exact rational number solutions.
Resumo:
Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.
Resumo:
Highly purified fluorescent labelled anti-bicuculline antibodies were used to mark bicuculline binding sites in cerebral cortex of monkey brain. Specific binding of bicuculline could be demonstrated in the synaptosomal fraction, when bicuculline was added both Image and Image . Addition of γ-aminobutyric acid (GABA) to the bicucullinised membrane led to a decrease in fluorescence indicating same receptor loci and establishing GABA-bicuculline antagonism at a molecular level.
Resumo:
There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organisations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.
Resumo:
The concept of cloud computing services (CCS) is appealing to small and medium enterprises (SMEs). However, while there is a significant push by various authorities on SMEs to adopt the CCS, knowledge of the key considerations to adopt the CCS is very limited. We use the technology-organization-environment (TOE) framework to suggest that a strategic and incremental intent, understanding the organizational structure and culture, understanding the external factors, and consideration of the human resource capacity can contribute to sustainable business value from CCS. Using survey data, we find evidence of a positive association between these considerations and the CCS-related business objectives. We also find evidence of positive association between the CCS-related business objectives and CCS-related financial objectives. The results suggest that the proposed considerations can ensure sustainable business value from the CCS. This study provides guidance to SMEs on a path to adopting the CCS with the intention of a long-term commitment and achieving sustainable business value from these services.
Resumo:
There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organizations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.
Resumo:
Stochastic volatility models are of fundamental importance to the pricing of derivatives. One of the most commonly used models of stochastic volatility is the Heston Model in which the price and volatility of an asset evolve as a pair of coupled stochastic differential equations. The computation of asset prices and volatilities involves the simulation of many sample trajectories with conditioning. The problem is treated using the method of particle filtering. While the simulation of a shower of particles is computationally expensive, each particle behaves independently making such simulations ideal for massively parallel heterogeneous computing platforms. In this paper, we present our portable Opencl implementation of the Heston model and discuss its performance and efficiency characteristics on a range of architectures including Intel cpus, Nvidia gpus, and Intel Many-Integrated-Core (mic) accelerators.
Resumo:
Among the iterative schemes for computing the Moore — Penrose inverse of a woll-conditioned matrix, only those which have an order of convergence three or two are computationally efficient. A Fortran programme for these schemes is provided.
Resumo:
Abstract is not available.
Resumo:
In the case of reinforced concrete slabs fixed at the boundaries, considerable enhancement in the load carrying capacity takes place due to compressive membrane action. In this paper a method is presented to analyse the effects of membrane action in fixed orthotropic circular slabs, carrying uniformly distributed loads. Depending on the radial moment capacity being greater or less than the circumferential moment capacity, two cases of orthotropy have been considered. Numerical results are worked out for certain assumed physical parameters and for different coefficients of orthotropy. Variations of load and bending moments with the central deflection are presented.
Resumo:
The correct localization of proteins is essential for cell viability. In order to achieve correct protein localization to cellular membranes, conserved membrane targeting and translocation mechanisms have evolved. The focus of this work was membrane targeting and translocation of a group of proteins that circumvent the known targeting and translocation mechanisms, the C-tail anchored protein family. Members of this protein family carry out a wide range of functions, from protein translocation and recognition events preceding membrane fusion, to the regulation of programmed cell death. In this work, the mechanisms of membrane insertion and targeting of two C-tail anchored proteins were studied utilizing in vivo and in vitro methods, in yeast and mammalian cell systems. The proteins studied were cytochrome b(5), a well characterized C-tail anchored model protein, and N-Bak, a novel member of the Bcl-2 family of regulators of programmed cell death. Membrane insertion of cytochrome b(5) into the endoplasmic reticulum membrane was found to occur independently of the known protein conducting channels, through which signal peptide-containing polypeptides are translocated. In fact, the membrane insertion process was independent of any protein components and did not require energy. Instead membrane insertion was observed to be dependent on the lipid composition of the membrane. The targeting of N-Bak was found to depend on the cellular context. Either the mitochondrial or endoplasmic reticulum membranes were targeted, which resulted in morphological changes of the target membranes. These findings indicate the existence of a novel membrane insertion mechanism for C-tail anchored proteins, in which membrane integration of the transmembrane domain, and the translocation of C-terminal fragments, appears to be spontaneous. This mode of membrane insertion is regulated by the target membrane fluidity, which depends on the lipid composition of the bilayer, and the hydrophobicity of the transmembrane domain of the C-tail anchored protein, as well as by the availability of the C-tail for membrane integration. Together these mechanisms enable the cell to achieve spatial and temporal regulation of sub-cellular localization of C-tail anchored proteins.
Resumo:
The cells of multicellular organisms have differentiated to carry out specific functions that are often accompanied by distinct cell morphology. The actin cytoskeleton is one of the key regulators of cell shape subsequently controlling multiple cellular events including cell migration, cell division, endo- and exocytosis. A large set of actin regulating proteins has evolved to achieve and tightly coordinate this wide range of functions. Some actin regulator proteins have so-called house keeping roles and are essential for all eukaryotic cells, but some have evolved to meet the requirements of more specialized cell-types found in higher organisms enabling complex functions of differentiated organs, such as liver, kidney and brain. Often processes mediated by the actin cytoskeleton, like formation of cellular protrusions during cell migration, are intimately linked to plasma membrane remodeling. Thus, a close cooperation between these two cellular compartments is necessary, yet not much is known about the underlying molecular mechanisms. This study focused on a vertebrate-specific protein called missing-in-metastasis (MIM), which was originally characterized as a metastasis suppressor of bladder cancer. We demonstrated that MIM regulates the dynamics of actin cytoskeleton via its WH2 domain, and is expressed in a cell-type specific manner. Interestingly, further examination showed that the IM-domain of MIM displays a novel membrane tubulation activity, which induces formation of filopodia in cells. Following studies demonstrated that this membrane deformation activity is crucial for cell protrusions driven by MIM. In mammals, there are five members of IM-domain protein family. Functions and expression patterns of these family members have remained poorly characterized. To understand the physiological functions of MIM, we generated MIM knockout mice. MIM-deficient mice display no apparent developmental defects, but instead suffer from progressive renal disease and increased susceptibility to tumors. This indicates that MIM plays a role in the maintenance of specific physiological functions associated with distinct cell morphologies. Taken together, these studies implicate MIM both in the regulation of the actin cytoskeleton and the plasma membrane. Our results thus suggest that members of MIM/IRSp53 protein family coordinate the actin cytoskeleton:plasma membrane interface to control cell and tissue morphogenesis in multicellular organisms.
Resumo:
A rank-augmnented LU-algorithm is suggested for computing a generalized inverse of a matrix. Initially suitable diagonal corrections are introduced in (the symmetrized form of) the given matrix to facilitate decomposition; a backward-correction scheme then yields a desired generalized inverse.