79 research outputs found
IEEE Transactions on Broadcasting Special Issue on: 5G for Broadband Multimedia Systems and Broadcasting
[EN] The upcoming fifth-generation ( 5G ) of wireless communications technologies is expected to revolutionize society digital transformation thanks to its unprecedented wireless performance capabilities, providing speeds of several Gbps, very low latencies well below 5 ms, ultra-reliable transmissions with up to 99.999% success probability, while being able to handle a huge number of devices simultaneously connected to the network. The first version of the 3GPP specification (i.e., Release 15) has been recently completed and many 5G trials are under plan or carrying out worldwide, with the first commercial deployments happening in 2019."© 2019 IEEE. Personal use of this material is permitted. PermissĂon from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertisĂng or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works."Gomez-Barquero, D.; Li, W.; Fuentes, M.; Xiong, J.; Araniti, G.; Akamine, C.; Wang, J. (2019). IEEE Transactions on Broadcasting Special Issue on: 5G for Broadband Multimedia Systems and Broadcasting. IEEE Transactions on Broadcasting. 65(2):351-355. https://doi.org/10.1109/TBC.2019.2914866S35135565
Systematic Analysis of Survival-Associated Alternative Splicing Signatures in Thyroid Carcinoma
Alternative splicing (AS) is a key mechanism involved in regulating gene expression and is closely related to tumorigenesis. The incidence of thyroid cancer (THCA) has increased during the past decade, and the role of AS in THCA is still unclear. Here, we used TCGA and to generate AS maps in patients with THCA. Univariate analysis revealed 825 AS events related to the survival of THCA. Five prognostic models of AA, AD, AT, ES, and ME events were obtained through lasso and multivariate analyses, and the final prediction model was established by integrating all the AS events in the five prediction models. Kaplan–Meier survival analysis revealed that the overall survival rate of patients in the high-risk group was significantly shorter than that of patients in the low-risk group. The ROC results revealed that the prognostic capabilities of each model at 3, 5, and 8 years were all greater than 0.7, and the final prognostic capabilities of the models were all greater than 0.9. By reviewing other databases and utilizing qPCR, we verified the established THCA gene model. In addition, gene set enrichment analysis showed that abnormal AS events might play key roles in tumor development and progression of THCA by participating in changes in molecular structure, homeostasis of the cell environment and in cell energy. Finally, a splicing correlation network was established to reveal the potential regulatory patterns between the predicted splicing factors and AS event candidates. In summary, AS should be considered an important prognostic indicator of THCA. Our results will help to elucidate the underlying mechanism of AS in the process of THCA tumorigenesis and broaden the prognostic and clinical application of molecular targeted therapy for THCA
Morphological diversity of single neurons in molecularly defined cell types.
Dendritic and axonal morphology reflects the input and output of neurons and is a defining feature of neuronal types1,2, yet our knowledge of its diversity remains limited. Here, to systematically examine complete single-neuron morphologies on a brain-wide scale, we established a pipeline encompassing sparse labelling, whole-brain imaging, reconstruction, registration and analysis. We fully reconstructed 1,741 neurons from cortex, claustrum, thalamus, striatum and other brain regions in mice. We identified 11 major projection neuron types with distinct morphological features and corresponding transcriptomic identities. Extensive projectional diversity was found within each of these major types, on the basis of which some types were clustered into more refined subtypes. This diversity follows a set of generalizable principles that govern long-range axonal projections at different levels, including molecular correspondence, divergent or convergent projection, axon termination pattern, regional specificity, topography, and individual cell variability. Although clear concordance with transcriptomic profiles is evident at the level of major projection type, fine-grained morphological diversity often does not readily correlate with transcriptomic subtypes derived from unsupervised clustering, highlighting the need for single-cell cross-modality studies. Overall, our study demonstrates the crucial need for quantitative description of complete single-cell anatomy in cell-type classification, as single-cell morphological diversity reveals a plethora of ways in which different cell types and their individual members may contribute to the configuration and function of their respective circuits
Robust estimation of bacterial cell count from optical density
Optical density (OD) is widely used to estimate the density of cells in liquid culture, but cannot be compared between instruments without a standardized calibration protocol and is challenging to relate to actual cell count. We address this with an interlaboratory study comparing three simple, low-cost, and highly accessible OD calibration protocols across 244 laboratories, applied to eight strains of constitutive GFP-expressing E. coli. Based on our results, we recommend calibrating OD to estimated cell count using serial dilution of silica microspheres, which produces highly precise calibration (95.5% of residuals <1.2-fold), is easily assessed for quality control, also assesses instrument effective linear range, and can be combined with fluorescence calibration to obtain units of Molecules of Equivalent Fluorescein (MEFL) per cell, allowing direct comparison and data fusion with flow cytometry measurements: in our study, fluorescence per cell measurements showed only a 1.07-fold mean difference between plate reader and flow cytometry data
Recommended from our members
On rational approximation and its applications
We are encountering more and more rare event probability problems as we move toward the information age. When systems are large or complex, it takes tremendous computing resources to solve these problems. Typically, it is easy to get simulation results at high probability values and these system functions usually have nice properties. These opens the door for the application of rational approximation algorithms. Rational approximation has been applied in quite a few performance evaluation problems in communication/computer systems. This dissertation further extends the research in this area. We first used several benchmark problems to verify the effectiveness of rational approximation algorithm. Then rational approximation based algorithms are developed to solve some problems in the networking area, such as the blocking probability analysis of optical networks and the reliability analysis of networks. When dealing with these problems, extensive experiments have been carried out to give convincing results. Our results indicate that rational approximation method is promising for applications in many areas. We also developed a method to estimate the error of rational approximants when there exist errors in the interpolation points
Challenges and Opportunities for Engineering Education
Abstract Email has evolved to be a convenient and important communication media. It greatly facilitates the communication among people from all over the world. The existence of all kinds of free email services makes email communication even more attractive. The convenience and popularity of emails has also made them ideal vehicles to spread computer worms and viruses. Email viruses and worms have appeared more frequently in recent months. How to detect and contain the spread of email viruses and worms while minimizing the side effects on normal email communications is a very important topic. This paper proposes an email virus detection and containment scheme to address this issue. Our scheme is inspired by the infectious disease control schemes used in real world. An infected computer is identified if it meets two conditions. Firstly, the computer has to demonstrate abnormal behavior by sending out large number of emails with attachments. Secondly, some of the computers which receive these emails have to demonstrate similar abnormal behavior. We propose to apply the "stone-in-the-pond" principle to reduce the overhead of the email virus detection system. The identified infected computers can then be isolated. Simulation experiments demonstrate that our proposed scheme is effective in controlling the spread of email viruses
ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the society by disrupting the normal information flow and collecting or destroying information without authorization. Compared to the e#ectiveness and ease of spreading worms and viruses, currently adopted defense schemes are slow to react and costly to implement
An Effective Scheme for Email Virus Detection and Containment
Email has evolved to be a convenient and important communication media. It greatly facilitates the communication among people from all over the world. The existence of all kinds of free email services makes email communication even more attractive. The convenience and popularity of emails has also made them ideal vehicles to spread computer worms and viruses. Email viruses and worms have appeared more frequently in recent months. How to detect and contain the spread of email viruses and worms while minimizing the side effects on normal email communications is a very important topic. This paper proposes an email virus detection and containment scheme to address this issue. Our scheme is inspired by the infectious disease control schemes used in real world. An infected computer is identified if it meets two conditions. Firstly, the computer has to demonstrate abnormal behavior by sending out large number of emails with attachments. Secondly, some of the computers which receive these emails have to demonstrate similar abnormal behavior. We propose to apply the &quot;stone-in-the-pond &quot; principle to reduce the overhead of the email virus detection system. The identified infected computers can then be isolated. Simulation experiments demonstrate that our proposed scheme is effective in controlling the spread of email viruses
Research and Optimization of Marine Diesel Engine Index System
Aiming at the quality evaluation of diesel engine, this paper analyzes the influence factors of diesel engine quality from the function and general quality of diesel engine, and establishes the detailed index system of diesel engine quality evaluation, which covers all aspects of diesel engine quality. Finally, the degree of discrimination is sorted by the entropy weight theory, and the indexes are optimized and screened
- …