982 resultados para Key cutting algorithm
Resumo:
Mouse mammary tumor virus (MMTV) is a retrovirus encoding a superantigen that is recognized in association with major histocompatibility complex class II by the variable region of the beta chain (V(beta)) of the T-cell receptor. The C-terminal 30 to 40 amino acids of the superantigen of different MMTVs display high sequence variability that correlates with the recognition of particular T-cell receptor V(beta) chains. Interestingly, MMTV(SIM) and mtv-8 superantigens are highly homologous but have nonoverlapping T-cell receptor V(beta) specificities. To determine the importance of these few differences for specific V(beta) interaction, we studied superantigen responses in mice to chimeric and mutant MMTV(SIM) and mtv-8 superantigens expressed by recombinant vaccinia viruses. We show that only a few changes (two to six residues) within the C terminus are necessary to modify superantigen recognition by specific V(beta)s. Thus, the introduction of the MMTV(SIM) residues 314-315 into the mtv-8 superantigen greatly decreased its V(beta)12 reactivity without gain of MMTV(SIM)-specific function. The introduction of MMTV(SIM)-specific residues 289 to 295, however, induced a recognition pattern that was a mixture of MMTV(SIM)- and mtv-8-specific V(beta) reactivities: both weak MMTV(SIM)-specific V(beta)4 and full mtv-8-specific V(beta)11 recognition were observed while V(beta)12 interaction was lost. The combination of the two MMTV(SIM)-specific regions in the mtv-8 superantigen established normal MMTV(SIM)-specific V(beta)4 reactivity and completely abolished mtv-8-specific V(beta)5, -11, and -12 interactions. These new functional superantigens with mixed V(beta) recognition patterns allowed us to precisely delineate sites relevant for molecular interactions between the SIM or mtv-8 superantigen and the T-cell receptor V(beta) domain within the 30 C-terminal residues of the viral superantigen.
Resumo:
This paper proposes an heuristic for the scheduling of capacity requests and the periodic assignment of radio resources in geostationary (GEO) satellite networks with star topology, using the Demand Assigned Multiple Access (DAMA) protocol in the link layer, and Multi-Frequency Time Division Multiple Access (MF-TDMA) and Adaptive Coding and Modulation (ACM) in the physical layer.
Resumo:
The stress-activated protein kinase c-Jun NH2-terminal kinase (JNK) is a central signal for interleukin-1beta (IL-1beta)-induced apoptosis in insulin-producing beta-cells. The cell-permeable peptide inhibitor of JNK (JNKI1), that introduces the JNK binding domain (JBD) of the scaffold protein islet-brain 1 (IB1) inside cells, effectively prevents beta-cell death caused by this cytokine. To define the molecular targets of JNK involved in cytokine-induced beta-cell apoptosis we investigated whether JNKI1 or stable expression of JBD affected the expression of selected pro- and anti-apoptotic genes induced in rat (RIN-5AH-T2B) and mouse (betaTC3) insulinoma cells exposed to IL-1beta. Inhibition of JNK significantly reduced phosphorylation of the specific JNK substrate c-Jun (p<0.05), IL-1beta-induced apoptosis (p<0.001), and IL-1beta-mediated c-fos gene expression. However, neither JNKI1 nor JBD did influence IL-1beta-induced NO synthesis or iNOS expression or the transcription of the genes encoding mitochondrial manganese superoxide dismutase (MnSOD), catalase (CAT), glutathione peroxidase (GPx), glutathione-S-transferase rho (GSTrho), heat shock protein (HSP) 70, IL-1beta-converting enzyme (ICE), caspase-3, apoptosis-inducing factor (AIF), Bcl-2 or Bcl-xL. We suggest that the anti-apoptotic effect of JNK inhibition by JBD is independent of the transcription of major pro- and anti-apoptotic genes, but may be exerted at the translational or posttranslational level.
Resumo:
Algoritmo que optimiza y crea pairings para tripulaciones de líneas aéreas mediante la posterior programación en Java.
Resumo:
The Raspas Complex (Ecuador) contains one of the few eclogitic bodies in the northern Andes. It consists of metaperidotites, eclogites, and metapelites. The latter display three assemblages: (i) garnet + chloritoid + kyanite, (ii) garnet + chloritoid and (iii) garnet + chlorite, in all cases with quartz and muscovite in addition. The growth of these assemblages was coeval with the main ductile deformation, and was followed by minor reequilibration (chlorite growth in garnet + chloritoid samples and chloritoid + quartz aggregates replacing garnet and kyanite in garnet + chloritoid + kyanite samples). Detailed microprobe analyses show increasing magnesian compositions for garnet (from core to rim) and chloritoid (inclusions within garnet compared to matrix grains) in kyanite-bearing samples. The above data are interpreted in the framework of the KFMASH system. Reaction progress along the divariant reaction Cld = Grt + Ky explains the change in chemistry of coexisting phases. The divariant Grt-Cld-Ky assemblage has a narrow stability field, and the P-T conditions are estimated at about 20 kbar, 550-600degreesC. Decompression, recorded by chloritoid-quartz pseudomorphs of garnet, probably occurred as temperature decreased.
Resumo:
We are going to implement the "GA-SEFS" by Tsymbal and analyse experimentally its performance depending on the classifier algorithms used in the fitness function (NB, MNge, SMO). We are also going to study the effect of adding to the fitness function a measure to control complexity of the base classifiers.
Resumo:
Unlike the adjustable gastric banding procedure (AGB), Roux-en-Y gastric bypass surgery (RYGBP) in humans has an intriguing effect: a rapid and substantial control of type 2 diabetes mellitus (T2DM). We performed gastric lap-band (GLB) and entero-gastro anastomosis (EGA) procedures in C57Bl6 mice that were fed a high-fat diet. The EGA procedure specifically reduced food intake and increased insulin sensitivity as measured by endogenous glucose production. Intestinal gluconeogenesis increased after the EGA procedure, but not after gastric banding. All EGA effects were abolished in GLUT-2 knockout mice and in mice with portal vein denervation. We thus provide mechanistic evidence that the beneficial effects of the EGA procedure on food intake and glucose homeostasis involve intestinal gluconeogenesis and its detection via a GLUT-2 and hepatoportal sensor pathway.
Resumo:
PURPOSE: Most RB1 mutations are unique and distributed throughout the RB1 gene. Their detection can be time-consuming and the yield especially low in cases of conservatively-treated sporadic unilateral retinoblastoma (Rb) patients. In order to identify patients with true risk of developing Rb, and to reduce the number of unnecessary examinations under anesthesia in all other cases, we developed a universal sensitive, efficient and cost-effective strategy based on intragenic haplotype analysis. METHODS: This algorithm allows the calculation of the a posteriori risk of developing Rb and takes into account (a) RB1 loss of heterozygosity in tumors, (b) preferential paternal origin of new germline mutations, (c) a priori risk derived from empirical data by Vogel, and (d) disease penetrance of 90% in most cases. We report the occurrence of Rb in first degree relatives of patients with sporadic Rb who visited the Jules Gonin Eye Hospital, Lausanne, Switzerland, from January 1994 to December 2006 compared to expected new cases of Rb using our algorithm. RESULTS: A total of 134 families with sporadic Rb were enrolled; testing was performed in 570 individuals and 99 patients younger than 4 years old were identified. We observed one new case of Rb. Using our algorithm, the cumulated total a posteriori risk of recurrence was 1.77. CONCLUSIONS: This is the first time that linkage analysis has been validated to monitor the risk of recurrence in sporadic Rb. This should be a useful tool in genetic counseling, especially when direct RB1 screening for mutations leaves a negative result or is unavailable.
Resumo:
The care for a patient with ulcerative colitis (UC) remains challenging despite the fact that morbidity and mortality rates have been considerably reduced during the last 30 years. The traditional management with intravenous corticosteroids was modified by the introduction of ciclosporin and infliximab. In this review, we focus on the treatment of patients with moderate to severe UC. Four typical clinical scenarios are defined and discussed in detail. The treatment recommendations are based on current literature, published guidelines and reviews, and were discussed at a consensus meeting of Swiss experts in the field. Comprehensive treatment algorithms were developed, aimed for daily clinical practice.
Resumo:
Abstract This thesis proposes a set of adaptive broadcast solutions and an adaptive data replication solution to support the deployment of P2P applications. P2P applications are an emerging type of distributed applications that are running on top of P2P networks. Typical P2P applications are video streaming, file sharing, etc. While interesting because they are fully distributed, P2P applications suffer from several deployment problems, due to the nature of the environment on which they perform. Indeed, defining an application on top of a P2P network often means defining an application where peers contribute resources in exchange for their ability to use the P2P application. For example, in P2P file sharing application, while the user is downloading some file, the P2P application is in parallel serving that file to other users. Such peers could have limited hardware resources, e.g., CPU, bandwidth and memory or the end-user could decide to limit the resources it dedicates to the P2P application a priori. In addition, a P2P network is typically emerged into an unreliable environment, where communication links and processes are subject to message losses and crashes, respectively. To support P2P applications, this thesis proposes a set of services that address some underlying constraints related to the nature of P2P networks. The proposed services include a set of adaptive broadcast solutions and an adaptive data replication solution that can be used as the basis of several P2P applications. Our data replication solution permits to increase availability and to reduce the communication overhead. The broadcast solutions aim, at providing a communication substrate encapsulating one of the key communication paradigms used by P2P applications: broadcast. Our broadcast solutions typically aim at offering reliability and scalability to some upper layer, be it an end-to-end P2P application or another system-level layer, such as a data replication layer. Our contributions are organized in a protocol stack made of three layers. In each layer, we propose a set of adaptive protocols that address specific constraints imposed by the environment. Each protocol is evaluated through a set of simulations. The adaptiveness aspect of our solutions relies on the fact that they take into account the constraints of the underlying system in a proactive manner. To model these constraints, we define an environment approximation algorithm allowing us to obtain an approximated view about the system or part of it. This approximated view includes the topology and the components reliability expressed in probabilistic terms. To adapt to the underlying system constraints, the proposed broadcast solutions route messages through tree overlays permitting to maximize the broadcast reliability. Here, the broadcast reliability is expressed as a function of the selected paths reliability and of the use of available resources. These resources are modeled in terms of quotas of messages translating the receiving and sending capacities at each node. To allow a deployment in a large-scale system, we take into account the available memory at processes by limiting the view they have to maintain about the system. Using this partial view, we propose three scalable broadcast algorithms, which are based on a propagation overlay that tends to the global tree overlay and adapts to some constraints of the underlying system. At a higher level, this thesis also proposes a data replication solution that is adaptive both in terms of replica placement and in terms of request routing. At the routing level, this solution takes the unreliability of the environment into account, in order to maximize reliable delivery of requests. At the replica placement level, the dynamically changing origin and frequency of read/write requests are analyzed, in order to define a set of replica that minimizes communication cost.
Resumo:
In this paper, we are proposing a methodology to determine the most efficient and least costly way of crew pairing optimization. We are developing a methodology based on algorithm optimization on Eclipse opensource IDE using the Java programming language to solve the crew scheduling problems.
Resumo:
In the finite field (FF) treatment of vibrational polarizabilities and hyperpolarizabilities, the field-free Eckart conditions must be enforced in order to prevent molecular reorientation during geometry optimization. These conditions are implemented for the first time. Our procedure facilities identification of field-induced internal coordinates that make the major contribution to the vibrational properties. Using only two of these coordinates, quantitative accuracy for nuclear relaxation polarizabilities and hyperpolarizabilities is achieved in π-conjugated systems. From these two coordinates a single most efficient natural conjugation coordinate (NCC) can be extracted. The limitations of this one coordinate approach are discussed. It is shown that the Eckart conditions can lead to an isotope effect that is comparable to the isotope effect on zero-point vibrational averaging, but with a different mass-dependence
Resumo:
With the widespread availability of high-throughput sequencing technologies, sequencing projects have become pervasive in the molecular life sciences. The huge bulk of data generated daily must be analyzed further by biologists with skills in bioinformatics and by "embedded bioinformaticians," i.e., bioinformaticians integrated in wet lab research groups. Thus, students interested in molecular life sciences must be trained in the main steps of genomics: sequencing, assembly, annotation and analysis. To reach that goal, a practical course has been set up for master students at the University of Lausanne: the "Sequence a genome" class. At the beginning of the academic year, a few bacterial species whose genome is unknown are provided to the students, who sequence and assemble the genome(s) and perform manual annotation. Here, we report the progress of the first class from September 2010 to June 2011 and the results obtained by seven master students who specifically assembled and annotated the genome of Estrella lausannensis, an obligate intracellular bacterium related to Chlamydia. The draft genome of Estrella is composed of 29 scaffolds encompassing 2,819,825 bp that encode for 2233 putative proteins. Estrella also possesses a 9136 bp plasmid that encodes for 14 genes, among which we found an integrase and a toxin/antitoxin module. Like all other members of the Chlamydiales order, Estrella possesses a highly conserved type III secretion system, considered as a key virulence factor. The annotation of the Estrella genome also allowed the characterization of the metabolic abilities of this strictly intracellular bacterium. Altogether, the students provided the scientific community with the Estrella genome sequence and a preliminary understanding of the biology of this recently-discovered bacterial genus, while learning to use cutting-edge technologies for sequencing and to perform bioinformatics analyses.
Resumo:
We present building blocks for algorithms for the efficient reduction of square factor, i.e. direct repetitions in strings. So the basic problem is this: given a string, compute all strings that can be obtained by reducing factors of the form zz to z. Two types of algorithms are treated: an offline algorithm is one that can compute a data structure on the given string in advance before the actual search for the square begins; in contrast, online algorithms receive all input only at the time when a request is made. For offline algorithms we treat the following problem: Let u and w be two strings such that w is obtained from u by reducing a square factor zz to only z. If we further are given the suffix table of u, how can we derive the suffix table for w without computing it from scratch? As the suffix table plays a key role in online algorithms for the detection of squares in a string, this derivation can make the iterated reduction of squares more efficient. On the other hand, we also show how a suffix array, used for the offline detection of squares, can be adapted to the new string resulting from the deletion of a square. Because the deletion is a very local change, this adaption is more eficient than the computation of the new suffix array from scratch.
Resumo:
Olivine nephelinites commonly contain macrocrysts of olivine and clinopyroxene. Some of these macrocrysts might represent fragments of the source region of the host magma transported to the Earth surface. If this hypothesis is correct these fragments can be used to characterize the composition of the source region and to put constraints on the magma generation process. In this study, we investigate the origin of macrocrysts and mineral aggregates from an olivine nephelinite from the Kaiserstuhl, Germany. We focus on clinopyroxenes (Cpx), which can be divided into three groups. Cpx I is relict Cpx from aggregates with deformed olivine that is depleted in Ca and characterized by strong light rare earth element (LREE) fractionation, low Ti/Eu and negative high field strength element (HFSE) anomalies. Its geochemical signature is consistent with formation by carbonatite metasomatism and with equilibration in the Presence of orthopyroxene. Cpx II is Ca-rich Cpx, forming both aggregates with deformed olivine and individual macrocrysts. The LREE, as for Cpx I, are strongly fractionated. Convex REE patterns may be present. The depletion in HFSE is less pronounced. Cpx III is oscillatory zoned Cpx phenociysis showing enrichment in Ca, convex REE patterns and no HFSE anomalies. The transition in the trace element abundances between the Cpx of the three groups is gradual. However, Cpx I and H did not crystallize from the host magma, as demonstrated by the presence of kink-bands and undulose extinction in the associated olivine and by the composition of alkali aluminosilicate glass inclusions in Cpx H. Based on the Cpx relationships, we interpret the studied suite of macrocrysts and mineral aggregates as a mixture of disintegrated fragments of the source region of the host olivine nephelinite. The process of melt generation was multi-stage. A primary carbonatite melt ascending from deeper levels in the mantle, probably from the dolomite-garnet peridotite stability field, reacted with mantle peridotite along the solidus ledge in the system lherzolite-CO2 (< 20-22 kbar) and started to crystallize carbonate minerals. Because of its low solidus temperature, the resulting carbonate-wehrlite assemblage melted incongruently with the formation of additional clinopyroxene. The carbonatite melt evolved during crystallization of carbonate minerals and concomitant incongruent melting of the carbonate-wehrlite, accompanied by the segregation of incipient alkali aluminosilicate melts. As a consequence of fast reaction rates in the presence of a carbonatite melt, this process probably took place under disequilibrium conditions. Further melting of the assemblage wehrlite + alkali aluminosilicate melt led to the generation of the olivine nephelinite magma. It entrained fragments of the wehrlite and brought them to the surface.