2,049 research outputs found

    Dynamic sampling schemes for optimal noise learning under multiple nonsmooth constraints

    Full text link
    We consider the bilevel optimisation approach proposed by De Los Reyes, Sch\"onlieb (2013) for learning the optimal parameters in a Total Variation (TV) denoising model featuring for multiple noise distributions. In applications, the use of databases (dictionaries) allows an accurate estimation of the parameters, but reflects in high computational costs due to the size of the databases and to the nonsmooth nature of the PDE constraints. To overcome this computational barrier we propose an optimisation algorithm that by sampling dynamically from the set of constraints and using a quasi-Newton method, solves the problem accurately and in an efficient way

    Valence isomerization of 2-phospha-4-silabicyclo[1.1.0]butane: a high-level ab initio study

    Get PDF
    The rearrangements for 2-phospha-4-silabicyclo[1.1.0]butane, analogous to the valence isomerization of the hydrocarbons bicyclobutane, 1,3-butadiene, and cyclobutene, were studied at the (U)QCISD(T)/6-311+G**//(U)QCISD/6-31G* level of theory. The monocyclic 1,2-dihydro-1,2-phosphasiletes are shown to be the thermodynamically preferred product, in contrast to the isomerization of the hydrocarbons, which favors the 1,3-butadiene structure. Furthermore, an unprecedented direct isomerization pathway to the 1,2-dihydro-1,2-phosphasiletes was identified. This pathway is competitive with the isomerization via the open-chain butadienes and becomes favorable when electron-donating substituents are present on silicon

    sCompile: Critical path identification and analysis for smart contracts

    Get PDF
    Ethereum smart contracts are an innovation built on top of the blockchain technology, which provides a platform for automatically executing contracts in an anonymous, distributed, and trusted way. The problem is magnified by the fact that smart contracts, unlike ordinary programs, cannot be patched easily once deployed. It is important for smart contracts to be checked against potential vulnerabilities. In this work, we propose an alternative approach to automatically identify critical program paths (with multiple function calls including inter-contract function calls) in a smart contract, rank the paths according to their criticalness, discard them if they are infeasible or otherwise present them with user friendly warnings for user inspection. We identify paths which involve monetary transaction as critical paths, and prioritize those which potentially violate important properties. For scalability, symbolic execution techniques are only applied to top ranked critical paths. Our approach has been implemented in a tool called sCompile, which has been applied to 36,099 smart contracts. The experiment results show that sCompile is efficient, i.e., 5 seconds on average for one smart contract. Furthermore, we show that many known vulnerabilities can be captured if user inspects as few as 10 program paths generated by sCompile. Lastly, sCompile discovered 224 unknown vulnerabilities with a false positive rate of 15.4% before user inspection.Comment: Accepted by ICFEM 201

    Bilevel Parameter Learning for Higher-Order Total Variation Regularisation Models.

    Get PDF
    We consider a bilevel optimisation approach for parameter learning in higher-order total variation image reconstruction models. Apart from the least squares cost functional, naturally used in bilevel learning, we propose and analyse an alternative cost based on a Huber-regularised TV seminorm. Differentiability properties of the solution operator are verified and a first-order optimality system is derived. Based on the adjoint information, a combined quasi-Newton/semismooth Newton algorithm is proposed for the numerical solution of the bilevel problems. Numerical experiments are carried out to show the suitability of our approach and the improved performance of the new cost functional. Thanks to the bilevel optimisation framework, also a detailed comparison between TGV 2 and ICTV is carried out, showing the advantages and shortcomings of both regularisers, depending on the structure of the processed images and their noise level.King Abdullah University of Science and Technology (KAUST) (Grant ID: KUKI1-007-43), Engineering and Physical Sciences Research Council (Grant IDs: Nr. EP/J009539/1 “Sparse & Higher-order Image Restoration” and Nr. EP/M00483X/1 “Efficient computational tools for inverse imaging problems”), Escuela Politécnica Nacional de Quito (Grant ID: PIS 12-14, MATHAmSud project SOCDE “Sparse Optimal Control of Differential Equations”), Leverhulme Trust (project on “Breaking the non-convexity barrier”), SENESCYT (Ecuadorian Ministry of Higher Education, Science, Technology and Innovation) (Prometeo Fellowship)This is the final version of the article. It first appeared from Springer via http://dx.doi.org/10.1007/s10851-016-0662-

    Clusters of circulating tumor cells traverse capillary-sized vessels

    Get PDF
    Multicellular aggregates of circulating tumor cells (CTC clusters) are potent initiators of distant organ metastasis. However, it is currently assumed that CTC clusters are too large to pass through narrow vessels to reach these organs. Here, we present evidence that challenges this assumption through the use of microfluidic devices designed to mimic human capillary constrictions and CTC clusters obtained from patient and cancer cell origins. Over 90% of clusters containing up to 20 cells successfully traversed 5- to 10-μm constrictions even in whole blood. Clusters rapidly and reversibly reorganized into single-file chain-like geometries that substantially reduced their hydrodynamic resistances. Xenotransplantation of human CTC clusters into zebrafish showed similar reorganization and transit through capillary-sized vessels in vivo. Preliminary experiments demonstrated that clusters could be disrupted during transit using drugs that affected cellular interaction energies. These findings suggest that CTC clusters may contribute a greater role to tumor dissemination than previously believed and may point to strategies for combating CTC cluster-initiated metastasis

    Direct and indirect control of the initiation of meiotic recombination by DNA damage checkpoint mechanisms in budding yeast

    Get PDF
    Meiotic recombination plays an essential role in the proper segregation of chromosomes at meiosis I in many sexually reproducing organisms. Meiotic recombination is initiated by the scheduled formation of genome-wide DNA double-strand breaks (DSBs). The timing of DSB formation is strictly controlled because unscheduled DSB formation is detrimental to genome integrity. Here, we investigated the role of DNA damage checkpoint mechanisms in the control of meiotic DSB formation using budding yeast. By using recombination defective mutants in which meiotic DSBs are not repaired, the effect of DNA damage checkpoint mutations on DSB formation was evaluated. The Tel1 (ATM) pathway mainly responds to unresected DSB ends, thus the sae2 mutant background in which DSB ends remain intact was employed. On the other hand, the Mec1 (ATR) pathway is primarily used when DSB ends are resected, thus the rad51 dmc1 double mutant background was employed in which highly resected DSBs accumulate. In order to separate the effect caused by unscheduled cell cycle progression, which is often associated with DNA damage checkpoint defects, we also employed the ndt80 mutation which permanently arrests the meiotic cell cycle at prophase I. In the absence of Tel1, DSB formation was reduced in larger chromosomes (IV, VII, II and XI) whereas no significant reduction was found in smaller chromosomes (III and VI). On the other hand, the absence of Rad17 (a critical component of the ATR pathway) lead to an increase in DSB formation (chromosomes VII and II were tested). We propose that, within prophase I, the Tel1 pathway facilitates DSB formation, especially in bigger chromosomes, while the Mec1 pathway negatively regulates DSB formation. We also identified prophase I exit, which is under the control of the DNA damage checkpoint machinery, to be a critical event associated with down-regulating meiotic DSB formation

    The zinc finger domain of Wilms' tumor 1 suppressor gene (WT1) behaves as a dominant negative, leading to abrogation of WT1 oncogenic potential in breast cancer cells

    Get PDF
    Abstract Introduction There is growing evidence that the Wilms' tumor 1 suppressor gene (WT1) behaves as an oncogene in some forms of breast cancer. Previous studies have demonstrated that the N-terminal domain of WT1 can act as a dominant negative through self-association. In the studies presented here we have explored the potential for the zinc finger domain (ZF) of WT1 to also have dominant-negative effects, and thus further our understanding of this protein. Methods Using full-length and ZF-only forms of WT1 we assessed their effect on the WT1 and c-myc promoter using luciferase and chromatin immunoprecipitation assays. The gene expression levels were determined by quantitative real-time RT-PCR, northern blot and western blot. We also assessed the effect of the ZF-only form on the growth of breast cancer cell lines in culture. Results Transfection with WT1–ZF plasmids resulted in a stronger inhibition of WT1 promoter than full-length WT1 in breast cancer cells. The WT1–ZF form lacking the lysine–threonine–serine (KTS) insert (ZF - KTS) can bind to the majority of WT1 consensus sites throughout the WT1 promoter region, while the ZF containing the insert (ZF + KTS) form only binds to sites in the proximal promoter. The abundances of endogenous WT1 mRNA and protein were markedly decreased following the stable expression of ZF - KTS in breast cancer cells. The expressions of WT1 target genes, including c-myc, Bcl-2, amphiregulin and TERT, were similarly suppressed by ZF - KTS. Moreover, WT1–ZF - KTS abrogated the transcriptional activation of c-myc mediated by all four predominant isoforms of WT1 (including or lacking alternatively spliced exons 5 and 9). Finally, WT1–ZF - KTS inhibited colony formation and cell division, but induced apoptosis in MCF-7 cells. Conclusion Our observations strongly argue that the WT1–ZF plasmid behaves as a dominant-negative regulator of the endogenous WT1 in breast cancer cells. The inhibition on proliferation of breast cancer cells by WT1–ZF - KTS provides a potential candidate of gene therapy for breast cancer

    The Functional DRD3 Ser9Gly Polymorphism (rs6280) Is Pleiotropic, Affecting Reward as Well as Movement

    Get PDF
    Abnormalities of motivation and behavior in the context of reward are a fundamental component of addiction and mood disorders. Here we test the effect of a functional missense mutation in the dopamine 3 receptor (DRD3) gene (ser9gly, rs6280) on reward-associated dopamine (DA) release in the striatum. Twenty-six healthy controls (HCs) and 10 unmedicated subjects with major depressive disorder (MDD) completed two positron emission tomography (PET) scans with [11C]raclopride using the bolus plus constant infusion method. On one occasion subjects completed a sensorimotor task (control condition) and on another occasion subjects completed a gambling task (reward condition). A linear regression analysis controlling for age, sex, diagnosis, and self-reported anhedonia indicated that during receipt of unpredictable monetary reward the glycine allele was associated with a greater reduction in D2/3 receptor binding (i.e., increased reward-related DA release) in the middle (anterior) caudate (p<0.01) and the ventral striatum (p<0.05). The possible functional effect of the ser9gly polymorphism on DA release is consistent with previous work demonstrating that the glycine allele yields D3 autoreceptors that have a higher affinity for DA and display more robust intracellular signaling. Preclinical evidence indicates that chronic stress and aversive stimulation induce activation of the DA system, raising the possibility that the glycine allele, by virtue of its facilitatory effect on striatal DA release, increases susceptibility to hyperdopaminergic responses that have previously been associated with stress, addiction, and psychosis

    Charged-Higgs phenomenology in the Aligned two-Higgs-doublet model

    Get PDF
    The alignment in flavour space of the Yukawa matrices of a general two-Higgs-doublet model results in the absence of tree-level flavour-changing neutral currents. In addition to the usual fermion masses and mixings, the aligned Yukawa structure only contains three complex parameters, which are potential new sources of CP violation. For particular values of these three parameters all known specific implementations of the model based on discrete Z_2 symmetries are recovered. One of the most distinctive features of the two-Higgs-doublet model is the presence of a charged scalar. In this work, we discuss its main phenomenological consequences in flavour-changing processes at low energies and derive the corresponding constraints on the parameters of the aligned two-Higgs-doublet model.Comment: 46 pages, 19 figures. Version accepted for publication in JHEP. References added. Discussion slightly extended. Conclusions unchange

    Dark matter scenarios in the minimal SUSY B-L model

    Full text link
    We perform a study of the dark matter candidates of a constrained version of the minimal R-parity-conserving supersymmetric model with a gauged U(1)BLU(1)_{B-L}. It turns out that there are four additional candidates for dark matter in comparison to the MSSM: two kinds of neutralino, which either correspond to the gaugino of the U(1)BLU(1)_{B-L} or to a fermionic bilepton, as well as "right-handed" CP-even and -odd sneutrinos. The correct dark matter relic density of the neutralinos can be obtained due to different mechanisms including new co-annihilation regions and resonances. The large additional Yukawa couplings required to break the U(1)BLU(1)_{B-L} radiatively often lead to large annihilation cross sections for the sneutrinos. The correct treatment of gauge kinetic mixing is crucial to the success of some scenarios. All candidates are consistent with the exclusion limits of Xenon100.Comment: 45 pages, 22 figures; v2: extended discussion of direct detection cross section, matches published versio
    corecore