16,598 research outputs found
XML in Motion from Genome to Drug
Information technology (IT) has emerged as a central to the solution of contemporary genomics and drug discovery problems. Researchers involved in genomics, proteomics, transcriptional profiling, high throughput structure determination, and in other sub-disciplines of bioinformatics have direct impact on this IT revolution. As the full genome sequences of many species, data from structural genomics, micro-arrays, and proteomics became available, integration of these data to a common platform require sophisticated bioinformatics tools. Organizing these data into knowledgeable databases and developing appropriate software tools for analyzing the same are going to be major challenges. XML (eXtensible Markup Language) forms the backbone of biological data representation and exchange over the internet, enabling researchers to aggregate data from various heterogeneous data resources. The present article covers a comprehensive idea of the integration of XML on particular type of biological databases mainly dealing with sequence-structure-function relationship and its application towards drug discovery. This e-medical science approach should be applied to other scientific domains and the latest trend in semantic web applications is also highlighted
The Sino-Indian border dispute and Asian security
Executive summaryThe border dispute between India and China is long and unique with disputes over length, control and third parties such as Tibet. From 1999 until 2008 India and China made fresh efforts to resolve the dispute, however these have faltered and stalled. The relationship between India and the US is affecting the relationship, both speeding up and slowing down resolution depending who India is focused on, Washington or Beijing. A middle power coalition, free of the US and China is the only way for countries such as India, Australia, Indonesia, Vietnam and Japan to ensure their security.Policy recommendationsAsian nations must recognize that distancing themselves from the United States will not necessarily win political rewards in Beijing. Deepening ties with the United States must remain a high priority for all of China’s neighbours.Asia’s regional powers, including Australia, India, Indonesia, Japan and Vietnam need to find ways to strengthen security cooperation amongst themselves in a variety of ways and through flexible political arrangements.Although each has a different set of compulsions in relation to China, they share an overriding objective in constructing a middle power coalition that can shape the Asian security order.The coalition must neither be seen as an extension of the American alliance system, nor a counter to it. It is the first step towards constructing an in-situ balance of power in Asia
Effect of laser on the bound magnetic polaron in a semimagnetic quantum wire
In the present investigation binding energy of the laser dressed hydrogenic donor in a Semi magnetic Quantum Wire like Cd1 – xMnx2Te/Cd1 – x1Mnx1Te/Cd1 – x2Mnx2Te and spin polaronic shift has been computed for various magnetic and laser fields within the effective mass approximation in the finite barrier model using variational method. The results are presented and discussed.
When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/2790
Instant restore after a media failure
Media failures usually leave database systems unavailable for several hours
until recovery is complete, especially in applications with large devices and
high transaction volume. Previous work introduced a technique called
single-pass restore, which increases restore bandwidth and thus substantially
decreases time to repair. Instant restore goes further as it permits read/write
access to any data on a device undergoing restore--even data not yet
restored--by restoring individual data segments on demand. Thus, the restore
process is guided primarily by the needs of applications, and the observed mean
time to repair is effectively reduced from several hours to a few seconds.
This paper presents an implementation and evaluation of instant restore. The
technique is incrementally implemented on a system starting with the
traditional ARIES design for logging and recovery. Experiments show that the
transaction latency perceived after a media failure can be cut down to less
than a second and that the overhead imposed by the technique on normal
processing is minimal. The net effect is that a few "nines" of availability are
added to the system using simple and low-overhead software techniques
Responding to Indo-Pacific rivalry: Australia, India and middle power coalitions
In this Analysis, Lowy Institute International Security Program Director Rory Medcalf and Nonresident Fellow C. Raja Mohan argue that Chinese assertiveness and uncertainties about America’s role in Indo-Pacific Asia are causing middle powers to look for alternative approaches to regional security. The Analysis argues that enhanced security cooperation between Indo-Pacific middle powers should be extended to the creation of “middle-power coalitions” in the region.
Key findings
China’s assertiveness and uncertainties about America’s response are causing middle powers in Indo-Pacific Asia to looking beyond traditional approaches to security
Cooperation between Indo-Pacific middle power coalitions would build regional resilience against the vagaries of US-China relations
India and Australia are well placed to form the core of middle power coalition buildin
The Edge of the Galactic Disc
As part of a stellar population sampling program, a series of photometric
probes at various field sizes and depths have been obtained in a low extinction
window in the galactic anticentre direction. Such data set strong constraints
on the radial structure of the disc. At the forefront of this "drilling"
program, very deep CCD frames probe the most external parts of the disc. Over
the whole effective magnitude range (18 to 25), all contributions in the
statistics which should be expected from old disc stars beyond 6 kpc vanish,
although such stars dominate by far at distances less than 5 kpc. This is the
signature of a sharp cut-off in the star density: the edge of the galactic disc
between 5.5 and 6 kpc. As a consequence, the galactic radius does not exceed 14
kpc (assuming =8.5). Colours of elliptical galaxies measured in
the field rule out the risk of being misled by undetected extinction.Comment: 8 pages, Besancon Observatory preprint n.
Unification and limitations of error suppression techniques for adiabatic quantum computing
While adiabatic quantum computation (AQC) possesses some intrinsic robustness
to noise, it is expected that a form of error control will be necessary for
large scale computations. Error control ideas developed for circuit-model
quantum computation do not transfer easily to the AQC model and to date there
have been two main proposals to suppress errors during an AQC implementation:
energy gap protection and dynamical decoupling. Here we show that these two
methods are fundamentally related and may be analyzed within the same
formalism. We analyze the effectiveness of such error suppression techniques
and identify critical constraints on the performance of error suppression in
AQC, suggesting that error suppression by itself is insufficient for
fault-tolerant, large-scale AQC and that a form of error correction is needed.
This manuscript has been superseded by the articles, "Error suppression and
error correction in adiabatic quantum computation I: techniques and
challenges," arXiv:1307.5893, and "Error suppression and error correction in
adiabatic quantum computation II: non-equilibrium dynamics," arXiv:1307.5892.Comment: 9 pages. Update replaces "Equivalence" with "Unification." This
manuscript has been superseded by the two-article series: arXiv:1307.5892 and
arXiv:1307.589
Stable quantum memories with limited measurement
We demonstrate the existence of a finite temperature threshold for a 1D
stabilizer code under an error correcting protocol that requires only a
fraction of the syndrome measurements. Below the threshold temperature, encoded
states have exponentially long lifetimes, as demonstrated by numerical and
analytical arguments. We sketch how this algorithm generalizes to higher
dimensional stabilizer codes with string-like excitations, like the toric code.Comment: 11 Pages, 7 Figure
- …