15,907 research outputs found

    Learning Robust Search Strategies Using a Bandit-Based Approach

    Full text link
    Effective solving of constraint problems often requires choosing good or specific search heuristics. However, choosing or designing a good search heuristic is non-trivial and is often a manual process. In this paper, rather than manually choosing/designing search heuristics, we propose the use of bandit-based learning techniques to automatically select search heuristics. Our approach is online where the solver learns and selects from a set of heuristics during search. The goal is to obtain automatic search heuristics which give robust performance. Preliminary experiments show that our adaptive technique is more robust than the original search heuristics. It can also outperform the original heuristics.Comment: Published at the Proceedings of 32th AAAI Conference on Artificial Intelligence (AAAI'18

    Solving Functional Constraints by Variable Substitution

    Full text link
    Functional constraints and bi-functional constraints are an important constraint class in Constraint Programming (CP) systems, in particular for Constraint Logic Programming (CLP) systems. CP systems with finite domain constraints usually employ CSP-based solvers which use local consistency, for example, arc consistency. We introduce a new approach which is based instead on variable substitution. We obtain efficient algorithms for reducing systems involving functional and bi-functional constraints together with other non-functional constraints. It also solves globally any CSP where there exists a variable such that any other variable is reachable from it through a sequence of functional constraints. Our experiments on random problems show that variable elimination can significantly improve the efficiency of solving problems with functional constraints

    Failure of classical elasticity in auxetic foams

    Full text link
    A recent derivation [P.H. Mott and C.M. Roland, Phys. Rev. B 80, 132104 (2009).] of the bounds on Poisson's ratio, v, for linearly elastic materials showed that the conventional lower limit, -1, is wrong, and that v cannot be less than 0.2 for classical elasticity to be valid. This is a significant result, since it is precisely for materials having small values of v that direct measurements are not feasible, so that v must be calculated from other elastic constants. Herein we measure directly Poisson's ratio for four materials, two for which the more restrictive bounds on v apply, and two having values below this limit of 0.2. We find that while the measured v for the former are equivalent to values calculated from the shear and tensile moduli, for two auxetic materials (v < 0), the equations of classical elasticity give inaccurate values of v. This is experimental corroboration that the correct lower limit on Poisson's ratio is 0.2 in order for classical elasticity to apply.Comment: 9 pages, 2 figure

    Stochastic Database Cracking: Towards Robust Adaptive Indexing in Main-Memory Column-Stores

    Get PDF
    Modern business applications and scientific databases call for inherently dynamic data storage environments. Such environments are characterized by two challenging features: (a) they have little idle system time to devote on physical design; and (b) there is little, if any, a priori workload knowledge, while the query and data workload keeps changing dynamically. In such environments, traditional approaches to index building and maintenance cannot apply. Database cracking has been proposed as a solution that allows on-the-fly physical data reorganization, as a collateral effect of query processing. Cracking aims to continuously and automatically adapt indexes to the workload at hand, without human intervention. Indexes are built incrementally, adaptively, and on demand. Nevertheless, as we show, existing adaptive indexing methods fail to deliver workload-robustness; they perform much better with random workloads than with others. This frailty derives from the inelasticity with which these approaches interpret each query as a hint on how data should be stored. Current cracking schemes blindly reorganize the data within each query's range, even if that results into successive expensive operations with minimal indexing benefit. In this paper, we introduce stochastic cracking, a significantly more resilient approach to adaptive indexing. Stochastic cracking also uses each query as a hint on how to reorganize data, but not blindly so; it gains resilience and avoids performance bottlenecks by deliberately applying certain arbitrary choices in its decision-making. Thereby, we bring adaptive indexing forward to a mature formulation that confers the workload-robustness previous approaches lacked. Our extensive experimental study verifies that stochastic cracking maintains the desired properties of original database cracking while at the same time it performs well with diverse realistic workloads.Comment: VLDB201

    Cytochrome P450 CYP1B1 interacts with 8-<i>methoxypsoralen</i> (8-MOP) and influences psoralen-Ultraviolet A (PUVA) sensitivity

    Get PDF
    Background: There are unpredictable inter-individual differences in sensitivity to psoralen-UVA (PUVA) photochemotherapy, used to treat skin diseases including psoriasis. Psoralens are metabolised by cytochrome P450 enzymes (P450), and we hypothesised that variability in cutaneous P450 expression may influence PUVA sensitivity. We previously showed that P450 CYP1B1 was abundantly expressed in human skin and regulated by PUVA, and described marked inter-individual differences in cutaneous CYP1B1 expression.Objectives: We investigated whether CYP1B1 made a significant contribution to 8-methoxypsoralen (8-MOP) metabolism, and whether individuality in CYP1B1 activity influenced PUVA sensitivity.Methods: We used E. coli membranes co-expressing various P450s and cytochrome P450 reductase (CPR) to study 8-MOP metabolism and cytotoxicity assays in CYP1B1-expressing mammalian cells to assess PUVA sensitivity.Results: We showed that P450s CYP1A1, CYP1A2, CYP1B1, CYP2A6 and CYP2E1 influence 8-MOP metabolism. As CYP1B1 is the most abundant P450 in human skin, we further demonstrated that: (i) CYP1B1 interacts with 8-MOP (ii) metabolism of the CYP1B1 substrates 7-ethoxyresorufin and 17-b-estradiol showed concentration-dependent inhibition by 8-MOP and (iii) inhibition of 7-ethoxyresorufin metabolism by 8-MOP was influenced by CYP1B1 genotype. The influence of CYP1B1 on PUVA cytotoxicity was further investigated in a Chinese hamster ovary cell line, stably expressing CYP1B1 and CPR, which was more sensitive to PUVA than control cells, suggesting that CYP1B1 metabolises 8-MOP to a more phototoxicmetabolite(s).Conclusion: Our data therefore suggest that CYP1B1 significantly contributes to cutaneous 8-MOP metabolism, and that individuality in CYP1B1 expression may influence PUVA sensitivity

    New intelligent network approach for monitoring physiological parameters : the case of Benin

    Get PDF
    Benin health system is facing many challenges as: (i) affordable high-quality health care to a growing population providing need, (ii) patients’ hospitalization time reduction, (iii) and presence time of the nursing staff optimization. Such challenges can be solved by remote monitoring of patients. To achieve this, five steps were followed. 1) Identification of the Wireless Body Area Network (WBAN) systems’ characteristics and the patient physiological parameters’ monitoring. 2) The national Integrated Patient Monitoring Network (RIMP) architecture modeling in a cloud of Technocenters. 3) Cross-analysis between the characteristics and the functional requirements identified. 4) Each Technocenter’s functionality simulation through: a) the design approach choice inspired by the life cycle of V systems; b) functional modeling through SysML Language; c) the communication technology and different architectures of sensor networks choice studying. 5) An estimate of the material resources of the national RIMP according to physiological parameters. A National Integrated Network for Patient Monitoring (RNIMP) remotely, ambulatory or not, was designed for Beninese health system. The implementation of the RNIMP will contribute to improve patients’ care in Benin. The proposed network is supported by a repository that can be used for its implementation, monitoring and evaluation. It is a table of 36 characteristic elements each of which must satisfy 5 requirements relating to: medical application, design factors, safety, performance indicators and materiovigilance

    Carbon nanotubes in the Coulomb blockade regime

    Get PDF
    Quantum transport through finite-length single wall carbon nanotubes was investigated theoretically in the Coulomb blockade regime. The spin-degenerate state of the nanotube is found to play a crucial role, and is responsible for the experimentally observed alternation in the heights of the conductance spectrum as electrons are added to the nanotubes. We also show that the relaxation of the energy eigenstates, which takes place as the electrons tunnel to and from the nanotubes, is responsible for the current saturation as a function of bias voltage polarity.published_or_final_versio

    Benchmarking Symbolic Execution Using Constraint Problems -- Initial Results

    Full text link
    Symbolic execution is a powerful technique for bug finding and program testing. It is successful in finding bugs in real-world code. The core reasoning techniques use constraint solving, path exploration, and search, which are also the same techniques used in solving combinatorial problems, e.g., finite-domain constraint satisfaction problems (CSPs). We propose CSP instances as more challenging benchmarks to evaluate the effectiveness of the core techniques in symbolic execution. We transform CSP benchmarks into C programs suitable for testing the reasoning capabilities of symbolic execution tools. From a single CSP P, we transform P depending on transformation choice into different C programs. Preliminary testing with the KLEE, Tracer-X, and LLBMC tools show substantial runtime differences from transformation and solver choice. Our C benchmarks are effective in showing the limitations of existing symbolic execution tools. The motivation for this work is we believe that benchmarks of this form can spur the development and engineering of improved core reasoning in symbolic execution engines

    HDAC inhibitors increase NRF2-signaling in tumour cells and blunt the efficacy of co-adminstered cytotoxic agents

    Get PDF
    The NRF2 signalling cascade provides a primary response against electrophilic chemicals and oxidative stress. The activation of NRF2-signaling is anticipated to have adverse clinical consequences; NRF2 is activated in a number of cancers and, additionally, its pharmacological activation by one compound can reduce the toxicity or efficiency of a second agent administered concomitantly. In this work, we have analysed systematically the ability of 152 research, pre-clinical or clinically used drugs to induce an NRF2 response using the MCF7-AREc32 NRF2 reporter. Ten percent of the tested drugs induced an NRF2 response. The NRF2 activators were not restricted to classical cytotoxic alkylating agents but also included a number of emerging anticancer drugs, including an IGF1-R inhibitor (NVP-AEW541), a PIM-1 kinase inhibitor (Pim1 inhibitor 2), a PLK1 inhibitor (BI 2536) and most strikingly seven of nine tested HDAC inhibitors. These findings were further confirmed by demonstrating NRF2-dependent induction of endogenous AKR genes, biomarkers of NRF2 activity. The ability of HDAC inhibitors to stimulate NRF2-signalling did not diminish their own potency as antitumour agents. However, when used to pre-treat cells, they did reduce the efficacy of acrolein. Taken together, our data suggest that the ability of drugs to stimulate NRF2 activity is common and should be investigated as part of the drug-development process
    corecore