592 research outputs found

    Virtual reality for the built environment: A critical review of recent advances

    Get PDF
    This paper reviews the current state of the art for Virtual Reality (VR) and Virtual Environment (VE) applications in the field of the built environment. The review begins with a brief overview of technological components involved in enabling VR technology. A classification framework is developed to classify 150 journal papers in order to reveal the scholarly coverage of VR and VE from 2005 to 2011, inclusive. The classification framework summarizes achievements, established knowledge, research issues and challenges in the area. The framework is based on four layers of VR: concept and theory, implementation, evaluation and industrial adoption. These layers encompass architecture and design, urban planning and landscape, engineering, construction, facility management, lifecycle integration, training and education. This paper also discusses various representative VR research work in line with the classification framework. Finally the paper predicts future research trends in this area

    pKNOT: the protein KNOT web server

    Get PDF
    Knotted proteins are more commonly observed in recent years due to the enormously growing number of structures in the Protein Data Bank (PDB). Studies show that the knot regions contribute to both ligand binding and enzyme activity in proteins such as the chromophore-binding domain of phytochrome, ketol–acid reductoisomerase or SpoU methyltransferase. However, there are still many misidentified knots published in the literature due to the absence of a convenient web tool available to the general biologists. Here, we present the first web server to detect the knots in proteins as well as provide information on knotted proteins in PDB—the protein KNOT (pKNOT) web server. In pKNOT, users can either input PDB ID or upload protein coordinates in the PDB format. The pKNOT web server will detect the knots in the protein using the Taylor's smoothing algorithm. All the detected knots can be visually inspected using a Java-based 3D graphics viewer. We believe that the pKNOT web server will be useful to both biologists in general and structural biologists in particular

    Triptolide Transcriptionally Represses HER2 in Ovarian Cancer Cells by Targeting NF- κ

    Get PDF
    Triptolide (TPL) inhibits the proliferation of a variety of cancer cells and has been proposed as an effective anticancer agent. In this study, we demonstrate that TPL downregulates HER2 protein expression in oral, ovarian, and breast cancer cells. It suppresses HER2 protein expression in a dose- and time-dependent manner. Transrepression of HER2 promoter activity by TPL is also observed. The interacting site of TPL on the HER2 promoter region is located between −207 and −103 bps, which includes a putative binding site for the transcription factor NF-κB. Previous reports demonstrated that TPL suppresses NF-κB expression. We demonstrate that overexpression of NF-κB rescues TPL-mediated suppression of HER2 promoter activity and protein expression in NIH3T3 cells and ovarian cancer cells, respectively. In addition, TPL downregulates the activated (phosphorylated) forms of HER2, phosphoinositide-3 kinase (PI3K), and serine/threonine-specific protein kinase (Akt). TPL also inhibits tumor growth in a mouse model. Furthermore, TPL suppresses HER2 and Ki-67 expression in xenografted tumors based on an immunohistochemistry (IHC) assay. These findings suggest that TPL transrepresses HER2 and suppresses the downstream PI3K/Akt-signaling pathway. Our study reveals that TPL can inhibit tumor growth and thereby may serve as a potential chemotherapeutic agent

    System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints

    Get PDF
    A weakly-hard fault model can be captured by an (m,k) constraint, where 0≤ m ≤ k , meaning that there are at most m bad events (faults) among any k consecutive events. In this article, we use a weakly-hard fault model to constrain the occurrences of faults in system inputs. We develop approaches to verify properties for all possible values of (m,k) , where k is smaller than or equal to a given  K , in an exact and efficient manner. By verifying all possible values of (m,k) , we define weakly-hard requirements for the system environment and design a runtime monitor based on counting the number of faults in system inputs. If the system environment satisfies the weakly-hard requirements, then the satisfaction of desired properties is guaranteed; otherwise, the runtime monitor can notify the system to switch to a safe mode. This is especially essential for cyber-physical systems that need to provide guarantees with limited resources and the existence of faults. Experimental results with discrete second-order control, network routing, vehicle following, and lane changing demonstrate the generality and the efficiency of the proposed approaches. </jats:p

    Cross-National Differences in Victimization : Disentangling the Impact of Composition and Context

    Get PDF
    Varying rates of criminal victimization across countries are assumed to be the outcome of countrylevel structural constraints that determine the supply ofmotivated o¡enders, as well as the differential composition within countries of suitable targets and capable guardianship. However, previous empirical tests of these ‘compositional’ and ‘contextual’ explanations of cross-national di¡erences have been performed upon macro-level crime data due to the unavailability of comparable individual-level data across countries. This limitation has had two important consequences for cross-national crime research. First, micro-/meso-level mechanisms underlying cross-national differences cannot be truly inferred from macro-level data. Secondly, the e¡ects of contextual measures (e.g. income inequality) on crime are uncontrolled for compositional heterogeneity. In this paper, these limitations are overcome by analysing individual-level victimization data across 18 countries from the International CrimeVictims Survey. Results from multi-level analyses on theft and violent victimization indicate that the national level of income inequality is positively related to risk, independent of compositional (i.e. micro- and meso-level) di¡erences. Furthermore, crossnational variation in victimization rates is not only shaped by di¡erences in national context, but also by varying composition. More speci¢cally, countries had higher crime rates the more they consisted of urban residents and regions with lowaverage social cohesion.
    corecore