42,022 research outputs found
Representability of algebraic topology for biomolecules in machine learning based scoring and virtual screening
This work introduces a number of algebraic topology approaches, such as
multicomponent persistent homology, multi-level persistent homology and
electrostatic persistence for the representation, characterization, and
description of small molecules and biomolecular complexes. Multicomponent
persistent homology retains critical chemical and biological information during
the topological simplification of biomolecular geometric complexity.
Multi-level persistent homology enables a tailored topological description of
inter- and/or intra-molecular interactions of interest. Electrostatic
persistence incorporates partial charge information into topological
invariants. These topological methods are paired with Wasserstein distance to
characterize similarities between molecules and are further integrated with a
variety of machine learning algorithms, including k-nearest neighbors, ensemble
of trees, and deep convolutional neural networks, to manifest their descriptive
and predictive powers for chemical and biological problems. Extensive numerical
experiments involving more than 4,000 protein-ligand complexes from the PDBBind
database and near 100,000 ligands and decoys in the DUD database are performed
to test respectively the scoring power and the virtual screening power of the
proposed topological approaches. It is demonstrated that the present approaches
outperform the modern machine learning based methods in protein-ligand binding
affinity predictions and ligand-decoy discrimination
Analysis of Dynamic Brain Imaging Data
Modern imaging techniques for probing brain function, including functional
Magnetic Resonance Imaging, intrinsic and extrinsic contrast optical imaging,
and magnetoencephalography, generate large data sets with complex content. In
this paper we develop appropriate techniques of analysis and visualization of
such imaging data, in order to separate the signal from the noise, as well as
to characterize the signal. The techniques developed fall into the general
category of multivariate time series analysis, and in particular we extensively
use the multitaper framework of spectral analysis. We develop specific
protocols for the analysis of fMRI, optical imaging and MEG data, and
illustrate the techniques by applications to real data sets generated by these
imaging modalities. In general, the analysis protocols involve two distinct
stages: `noise' characterization and suppression, and `signal' characterization
and visualization. An important general conclusion of our study is the utility
of a frequency-based representation, with short, moving analysis windows to
account for non-stationarity in the data. Of particular note are (a) the
development of a decomposition technique (`space-frequency singular value
decomposition') that is shown to be a useful means of characterizing the image
data, and (b) the development of an algorithm, based on multitaper methods, for
the removal of approximately periodic physiological artifacts arising from
cardiac and respiratory sources.Comment: 40 pages; 26 figures with subparts including 3 figures as .gif files.
Originally submitted to the neuro-sys archive which was never publicly
announced (was 9804003
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
Police SWAT teams and Military Special Forces face mounting pressure and
challenges from adversaries that can only be resolved by way of ever more
sophisticated inputs into tactical operations. Lethal Autonomy provides
constrained military/security forces with a viable option, but only if
implementation has got proper empirically supported foundations. Autonomous
weapon systems can be designed and developed to conduct ground, air and naval
operations. This monograph offers some insights into the challenges of
developing legal, reliable and ethical forms of autonomous weapons, that
address the gap between Police or Law Enforcement and Military operations that
is growing exponentially small. National adversaries are today in many
instances hybrid threats, that manifest criminal and military traits, these
often require deployment of hybrid-capability autonomous weapons imbued with
the capability to taken on both Military and/or Security objectives. The
Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of
Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that
required military response and police investigations against a fighting cell of
the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
Discovering an active subspace in a single-diode solar cell model
Predictions from science and engineering models depend on the values of the
model's input parameters. As the number of parameters increases, algorithmic
parameter studies like optimization or uncertainty quantification require many
more model evaluations. One way to combat this curse of dimensionality is to
seek an alternative parameterization with fewer variables that produces
comparable predictions. The active subspace is a low-dimensional linear
subspace defined by important directions in the model's input space; input
perturbations along these directions change the model's prediction more, on
average, than perturbations orthogonal to the important directions. We describe
a method for checking if a model admits an exploitable active subspace, and we
apply this method to a single-diode solar cell model with five input
parameters. We find that the maximum power of the solar cell has a dominant
one-dimensional active subspace, which enables us to perform thorough parameter
studies in one dimension instead of five
Computed poststenotic flow instabilities correlate phenotypically with vibrations measured using laser Doppler vibrometry : perspectives for a promising in vivo device for early detection of moderate and severe carotid stenosis
Early detection of asymptomatic carotid stenosis is crucial for treatment planning in the prevention of ischemic stroke. Auscultation, the current first-line screening methodology, comes with severe limitations that create urge for novel and robust techniques. Laser Doppler vibrometer (LDV) is a promising tool for inferring carotid stenosis by measuring stenosis-induced vibrations. The goal of the current study was to evaluate the feasibility of LDV for carotid stenosis detection. LDV measurements on a carotid phantom were used to validate our previously verified high-resolution computational fluid dynamics methodology, which was used to evaluate the impact of flowrate, flow split, and stenosis severity on the poststenotic intensity of flow instabilities (IFI). We evaluated sensitivity, specificity, and accuracy of using IFI for stenoses detection. Linear regression analyses showed that computationally derived pressure fluctuations correlated (R2 = 0.98) with LDV measurements of stenosis-induced vibrations. The flowrate of stenosed vessels correlated (R2 = 0.90) with the presence of poststenotic instabilities. Receiver operating characteristic analyses of power spectra revealed that the most relevant frequency bands for the detection of moderate (56–76%) and severe (86–96%) stenoses were 80–200 Hz and 0–40 Hz, respectively. Moderate stenosis was identified with sensitivity and specificity of 90%; values decreased to 70% for severe stenosis. The use of LDV as screening tool for asymptomatic stenosis can potentially provide improved accuracy of current screening methodologies for early detection. The applicability of this promising device for mass screening is currently being evaluated clinically
Graph-based Neural Multi-Document Summarization
We propose a neural multi-document summarization (MDS) system that
incorporates sentence relation graphs. We employ a Graph Convolutional Network
(GCN) on the relation graphs, with sentence embeddings obtained from Recurrent
Neural Networks as input node features. Through multiple layer-wise
propagation, the GCN generates high-level hidden sentence features for salience
estimation. We then use a greedy heuristic to extract salient sentences while
avoiding redundancy. In our experiments on DUC 2004, we consider three types of
sentence relation graphs and demonstrate the advantage of combining sentence
relations in graphs with the representation power of deep neural networks. Our
model improves upon traditional graph-based extractive approaches and the
vanilla GRU sequence model with no graph, and it achieves competitive results
against other state-of-the-art multi-document summarization systems.Comment: In CoNLL 201
- …