545 resultados para Acyclic Permutation
Resumo:
In this study, we present a framework based on ant colony optimization (ACO) for tackling combinatorial problems. ACO algorithms have been applied to many diferent problems, focusing on algorithmic variants that obtain high-quality solutions. Usually, the implementations are re-done for various problem even if they maintain the same details of the ACO algorithm. However, our goal is to generate a sustainable framework for applications on permutation problems. We concentrate on understanding the behavior of pheromone trails and specific methods that can be combined. Eventually, we will propose an automatic offline configuration tool to build an efective algorithm. ---RESUMEN---En este trabajo vamos a presentar un framework basado en la familia de algoritmos ant colony optimization (ACO), los cuales están dise~nados para enfrentarse a problemas combinacionales. Los algoritmos ACO han sido aplicados a diversos problemas, centrándose los investigadores en diversas variantes que obtienen buenas soluciones. Normalmente, las implementaciones se tienen que rehacer, inclusos si se mantienen los mismos detalles para los algoritmos ACO. Sin embargo, nuestro objetivo es generar un framework sostenible para aplicaciones sobre problemas de permutaciones. Nos centraremos en comprender el comportamiento de la sendas de feromonas y ciertos métodos con los que pueden ser combinados. Finalmente, propondremos una herramienta para la configuraron automática offline para construir algoritmos eficientes.
Resumo:
Recent studies on proteins whose N and C termini are in close proximity have demonstrated that folding of polypeptide chains and assembly of oligomers can be accomplished with circularly permuted chains. As yet no methodical study has been conducted to determine how extensively new termini can be introduced and where such termini cannot be tolerated. We have devised a procedure to generate random circular permutations of the catalytic chains of Escherichia coli aspartate transcarbamoylase (ATCase; EC 2.1.3.2) and to select clones that produce active or stable holoenzyme containing permuted chains. A tandem gene construct was made, based on the desired linkage between amino acid residues in the C- and N-terminal regions of the polypeptide chain, and this DNA was treated with a suitable restriction enzyme to yield a fragment containing the rearranged coding sequence for the chain. Circularization achieved with DNA ligase, followed by linearization at random with DNase I, and incorporation of the linearized, repaired, blunt-ended, rearranged genes into a suitable plasmid permitted the expression of randomly permuted polypeptide chains. The plasmid with appropriate stop codons also contained pyrI, the gene encoding the regulatory chain of ATCase. Colonies expressing detectable amounts of ATCase-like molecules containing permuted catalytic chains were identified by an immunoblot technique or by their ability to grow in the absence of pyrimidines in the growth medium. Sequencing of positive clones revealed a variety of novel circular permutations. Some had N and C termini within helices of the wild-type enzyme as well as deletions and insertions. Permutations were concentrated in the C-terminal domain and only few were detected in the N-terminal domain. The technique, which is adaptable generally to proteins whose N and C termini are near each other, can be of value in relating in vivo folding of nascent, growing polypeptide chains to in vitro renaturation of complete chains and determining the role of protein sequence in folding kinetics.
Resumo:
We investigate the critical properties of the four-state commutative random permutation glassy Potts model in three and four dimensions by means of Monte Carlo simulations and a finite-size scaling analysis. By using a field programmable gate array, we have been able to thermalize a large number of samples of systems with large volume. This has allowed us to observe a spin-glass ordered phase in d=4 and to study the critical properties of the transition. In d=3, our results are consistent with the presence of a Kosterlitz-Thouless transition, but also with different scenarios: transient effects due to a value of the lower critical dimension slightly below 3 could be very important.
Resumo:
Optimized structure of the educational program consisting of a set of the interconnected educational objects is offered by means of problem solution of optimum partition of the acyclic weighed graph. The condition of acyclicity preservation for subgraphs is formulated and the quantitative assessment of decision options is executed. The original algorithm of search of quasioptimum partition using the genetic algorithm scheme with coding chromosomes by permutation is offered. Object-oriented realization of algorithm in language C++ is described and results of numerical experiments are presented.
Resumo:
The most potent known naturally occurring Bowman-Birk inhibitor, sunflower trypsin inhibitor-1 (SFTI-1), is a bicyclic 14-amino acid peptide from sunflower seeds comprising one disulfide bond and a cyclic backbone. At present, little is known about the cyclization mechanism of SFTI-1. We show here that an acyclic permutant of SFTI-1 open at its scissile bond, SFTI-1[ 6,5], also functions as an inhibitor of trypsin and that it can be enzymatically backbone-cyclized by incubation with bovine beta-trypsin. The resulting ratio of cyclic SFTI-1 to SFTI1[6,5] is similar to9:1 regardless of whether trypsin is incubated with SFTI-1[ 6,5] or SFTI-1. Enzymatic resynthesis of the scissile bond to form cyclic SFTI-1 is a novel mechanism of cyclization of SFTI-1[ 6,5]. Such a reaction could potentially occur on a trypsin affinity column as used in the original isolation procedure of SFTI-1. We therefore extracted SFTI-1 from sunflower seeds without a trypsin purification step and confirmed that the backbone of SFTI-1 is indeed naturally cyclic. Structural studies on SFTI-1[ 6,5] revealed high heterogeneity, and multiple species of SFTI-1[ 6,5] were identified. The main species closely resembles the structure of cyclic SFTI-1 with the broken binding loop able to rotate between a cis/trans geometry of the I7-P8 bond with the cis conformer being similar to the canonical binding loop conformation. The non-reactive loop adopts a beta-hairpin structure as in cyclic wild-type SFTI-1. Another species exhibits an isoaspartate residue at position 14 and provides implications for possible in vivo cyclization mechanisms.
Resumo:
The cyclotides are a family of head-to-tail cyclized peptides that display exceptionally high stability and a range of biological activities. Acyclic permutants that contain a break in the circular backbone have been reported to be devoid of the haemolytic activity of the prototypic cyclotide kalata B1, but the potential role of the charges at the introduced termini in this loss of membraneolytic activity has not been fully determined. In this study, acyclic permutants of kalata B1 with capped N- and G termini were synthesized and found to adopt a native fold. These variants were observed to cause no measurable lysis of erythrocytes, strengthening the connection between backbone cyclization and haemolytic activity. (C) 2004 Published by Elsevier B.V. on behalf of the Federation of European Biochemical Societies.
Resumo:
Potato type II serine proteinase inhibitors are proteins that consist of multiple sequence repeats, and exhibit a multidomain structure. The structural domains are circular permutations of the repeat sequence.. as a result or intramolecular domain swapping. Structural studies give indications for the origins of this folding behaviour, and the evolution of the inhibitor family.
Resumo:
The Introduction gives a brief resume' of the biologically important aspects of 5 -aminoimidazole -4 -carbozamide (1) and explores., in-depth, the synthetic routes to this imidazole. All documented reactions of 5 -aninoimidanole-4 -carboxamide are reviewed in detail, with particular emphasis on the preparation and subsequent coupling reactions of 5 –diazo-imidazole-4 -carboxamide (6). A series of thirteen novel amide 5-amino-2-arylazoimidazole-4-carboxamide derivatives (117-129) were prepared by the coupling of aryldiazonium salts with 5-aminoimidazole-4-carboxamide. Chemical modification of these azo-dyes resulted in the preparation of eight previously unknown acyl derivatives (136-143) Interaction of 5-amino-2-arylazoimidazole-4-carboxides with ethyl formate in sodium ethoxide effected pyrimidine ring closure to the novel 8-arylazohypoxanthines (144 and 145). Several reductive techniques were employed in an effort to obtain the elusive 2,5-diaminoimidazole-4-carboxamide (71),a candidate chemotherapeutic agent, from the arylazoiridazoles. No success can be reported although 5-amino-2-(3-aminoindazol-2-yl) imidazole-4-carboxamide (151) was isolated due to a partial reduction and intramolecular cyclisation of 5-amino72-(2-cyanaphenylazo)imidazole-4-carboxamide (122) .Further possible synthetic approaches to the diaminoimidazole are discussed in Chapter 4. An interesting degradation of a known unstable nitrohydrazone is described in Chapter 5.This resulted in formation of 1, 1-bis(pyrazol--3-ylazo)-1-nitroethane (164) instead of the expected cyclisation to a bicyclic tetrazine N-oxide. An improved preparation of 5-diazoinidazole-4-carboxamide has been achieved, and the diazo-azole formed cycloadducts with isocyanates to yield the hitherto unknown imidazo[5,1-d][1,2,3,5]tetrazin-7(6H)-ones. Eleven derivatives (167-177) of this new ring-system were prepared and characterised. Chemical and spectroscopic investigation showed this ring-system to be unstable under certain conditions, and a comparative study of stability within the group has been made. "Retro-cycloaddition" under protic and photolytic conditions was an unexpected property of 6-substituted imidazo[5,1-d][1,2,3,5]tetrazin--7(0)-ones.Selected examples of the imidazotetrazinone ring-system were tested for antitumour activity. The results of biological evaluation are given in Chapter 7, and have culminated in a Patent application by the collaborating body, May and Baker Ltd. One compound,3-carbamoyl-6-(2-chloro-ethyl)imidazo[5,1-d][1,2,3,5jtetrazin-7(6H)-one (175),shows striking anti-tumour activity in rodent test systems.
Resumo:
In this article we discuss a possibility to use genetic algorithms in cryptanalysis. We developed and described the genetic algorithm for finding the secret key of a block permutation cipher. In this case key is a permutation of some first natural numbers. Our algorithm finds the exact key’s length and the key with controlled accuracy. Evaluation of conducted experiment’s results shows that the almost automatic cryptanalysis is possible.
Resumo:
Permutation games are totally balanced transferable utility cooperative games arising from certain sequencing and re-assignment optimization problems. It is known that for permutation games the bargaining set and the core coincide, consequently, the kernel is a subset of the core. We prove that for permutation games the kernel is contained in the least core, even if the latter is a lower dimensional subset of the core. By means of a 5-player permutation game we demonstrate that, in sense of the lexicographic center procedure leading to the nucleolus, this inclusion result can not be strengthened. Our 5-player permutation game is also an example (of minimum size) for a game with a non-convex kernel.
Resumo:
Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal.
Resumo:
Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal.
Resumo:
International audience
Resumo:
2016
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.