1,698 research outputs found

    RLE Plots: Visualising Unwanted Variation in High Dimensional Data

    Get PDF
    Unwanted variation can be highly problematic and so its detection is often crucial. Relative log expression (RLE) plots are a powerful tool for visualising such variation in high dimensional data. We provide a detailed examination of these plots, with the aid of examples and simulation, explaining what they are and what they can reveal. RLE plots are particularly useful for assessing whether a procedure aimed at removing unwanted variation, i.e. a normalisation procedure, has been successful. These plots, while originally devised for gene expression data from microarrays, can also be used to reveal unwanted variation in many other kinds of high dimensional data, where such variation can be problematic.Comment: 9 pages, 3 figure

    A theory for investment across defences triggered at different stages of a predator-prey encounter

    Get PDF
    We introduce a general theoretical description of a combination of defences acting sequentially at different stages in the predatory sequence in order to make predictions about how animal prey should best allocate investment across different defensive stages. We predict that defensive investment will often be concentrated at stages early in the interaction between a predator individual and the prey (especially if investment is concentrated in only one defence, then it will be in the first defence). Key to making this prediction is the assumption that there is a cost to a prey when it has a defence tested by an enemy, for example because this incurs costs of deployment or tested costs as a defence is exposed to the enemies; and the assumption that the investment functions are the same among defences. But if investment functions are different across defences (e.g. the investment efficiency in making resources into defences is higher in later defences than in earlier defences), then the contrary could happen. The framework we propose can be applied to other victim-exploiter systems, such as insect herbivores feeding on plant tissues. This leads us to propose a novel explanation for the observation that herbivory damage is often not well explained by variation in concentrations of toxic plant secondary metabolites. We compare our general theoretical structure with related examples in the literature, and conclude that coevolutionary approaches will be profitable in future work

    A single-array preprocessing method for estimating full-resolution raw copy numbers from all Affymetrix genotyping arrays including GenomeWideSNP 5 & 6

    Get PDF
    Motivation: High-resolution copy-number (CN) analysis has in recent years gained much attention, not only for the purpose of identifying CN aberrations associated with a certain phenotype, but also for identifying CN polymorphisms. In order for such studies to be successful and cost effective, the statistical methods have to be optimized. We propose a single-array preprocessing method for estimating full-resolution total CNs. It is applicable to all Affymetrix genotyping arrays, including the recent ones that also contain non-polymorphic probes. A reference signal is only needed at the last step when calculating relative CNs. Results: As with our method for earlier generations of arrays, this one controls for allelic crosstalk, probe affinities and PCR fragment-length effects. Additionally, it also corrects for probe sequence effects and co-hybridization of fragments digested by multiple enzymes that takes place on the latest chips. We compare our method with Affymetrix's CN5 method and the dChip method by assessing how well they differentiate between various CN states at the full resolution and various amounts of smoothing. Although CRMA v2 is a single-array method, we observe that it performs as well as or better than alternative methods that use data from all arrays for their preprocessing. This shows that it is possible to do online analysis in large-scale projects where additional arrays are introduced over time. Availability: A bounded-memory implementation that can process any number of arrays is available in the open source R package aroma.affymetrix. Contact: [email protected] Supplementary information: Supplementary data are available at Bioinformatics onlin

    Conceptualization of energy security in resource-poor economies: The role of the nature of economy

    Full text link
    © 2017 Elsevier Ltd This paper studies how energy security is conceptualized in four resource-poor, advanced island economies: Singapore, South Korea, Japan, and Taiwan. It is found that the energy security conceptualization of the four economies in effect returns to the very original and conventional one: stable and reliable energy supply. However, these economies are different in the level of stability and reliability demanded. Why are they similar in energy security conceptualization whereas different in the level of stability and reliability demanded? Adopting documentation analysis, comparative study, and the varieties of capitalism theory, we find that the nature of economy constitutes the decisive factor that shapes energy security conceptualization. The coordinated market economies (CMEs) are more concerned about energy supply disruption than the liberalized market economies (LMEs). The paper demonstrates that despite numerous energy security concepts in the literature, resource-poor economies still adopt the original and conventional one in practice. The findings suggest that security of supply is the top measure for resource-poor economies to improve their energy security and creating a joint petroleum and LNG market would be desirable for the four economies in this study

    "Parasite-induced aposematism" protects entomopathogenic nematode parasites against invertebrate enemies

    Get PDF
    Aposematism is a well-known strategy in which prey defend themselves from predation by pairing defenses such as toxins, with warning signals that are often visually conspicuous color patterns. Here, we examine the possibility that aposematism can be induced in a host by colonies of infectious parasites in order to protect the parasites from the consequences of attacks on the host. Earlier studies show that avian predators are reluctant to feed on carcasses of host prey that are infected with the entomopathogenic nematode, Heterorhabditis bacteriophora. As the age of infection increases, the parasites kill and preserve the host and subsequently cause its color to change, becoming bright pink then red. Nematode colonies in dead hosts may also be vulnerable, however, to nocturnally active foragers that do not use vision in prey detection. Here, then we test a novel hypothesis that the nematode parasites also produce a warning odor, which functions to repel nocturnally active predators (in this case, the beetle Pterostichus madidus). We show that beetles decrease their feeding on infected insect prey as the age of infection increases and that olfactory cues associated with the infections are effective mechanisms for deterring beetle predation, even at very early stages of infection. We propose that “parasite-induced aposematism” from the nematodes serves to replace the antipredator defenses of the recently killed host. Because sessile carcasses are exposed to a greater range of predators than the live hosts, several alternative defense mechanisms are required to protect the colony, hence aposematic signals are likely diverse in such “parasite-induced aposematism.

    Tele-operated high speed anthropomorphic dextrous hands with object shape and texture identification

    Get PDF
    This paper reports on the development of two number of robotic hands have been developed which focus on tele-operated high speed anthropomorphic dextrous robotic hands. The aim of developing these hands was to achieve a system that seamlessly interfaced between humans and robots. To provide sensory feedback, to a remote operator tactile sensors were developed to be mounted on the robotic hands. Two systems were developed, the first, being a skin sensor capable of shape reconstruction placed on the palm of the hand to feed back the shape of objects grasped and the second is a highly sensitive tactile array for surface texture identification
    corecore