15,291 research outputs found

    XML in Motion from Genome to Drug

    Get PDF
    Information technology (IT) has emerged as a central to the solution of contemporary genomics and drug discovery problems. Researchers involved in genomics, proteomics, transcriptional profiling, high throughput structure determination, and in other sub-disciplines of bioinformatics have direct impact on this IT revolution. As the full genome sequences of many species, data from structural genomics, micro-arrays, and proteomics became available, integration of these data to a common platform require sophisticated bioinformatics tools. Organizing these data into knowledgeable databases and developing appropriate software tools for analyzing the same are going to be major challenges. XML (eXtensible Markup Language) forms the backbone of biological data representation and exchange over the internet, enabling researchers to aggregate data from various heterogeneous data resources. The present article covers a comprehensive idea of the integration of XML on particular type of biological databases mainly dealing with sequence-structure-function relationship and its application towards drug discovery. This e-medical science approach should be applied to other scientific domains and the latest trend in semantic web applications is also highlighted

    The Sino-Indian border dispute and Asian security

    Get PDF
    Executive summaryThe border dispute between India and China is long and unique with disputes over length, control and third parties such as Tibet. From 1999 until 2008 India and China made fresh efforts to resolve the dispute, however these have faltered and stalled. The relationship between India and the US is affecting the relationship, both speeding up and slowing down resolution depending who India is focused on, Washington or Beijing. A middle power coalition, free of the US and China is the only way for countries such as India, Australia, Indonesia, Vietnam and Japan to ensure their security.Policy recommendationsAsian nations must recognize that distancing themselves from the United States will not necessarily win political rewards in Beijing. Deepening ties with the United States must remain a high priority for all of China’s neighbours.Asia’s regional powers, including Australia, India, Indonesia, Japan and Vietnam need to find ways to strengthen security cooperation amongst themselves in a variety of ways and through flexible political arrangements.Although each has a different set of compulsions in relation to China, they share an overriding objective in constructing a middle power coalition that can shape the Asian security order.The coalition must neither be seen as an extension of the American alliance system, nor a counter to it. It is the first step towards constructing an in-situ balance of power in Asia

    Effect of laser on the bound magnetic polaron in a semimagnetic quantum wire

    Get PDF
    In the present investigation binding energy of the laser dressed hydrogenic donor in a Semi magnetic Quantum Wire like Cd1 – xMnx2Te/Cd1 – x1Mnx1Te/Cd1 – x2Mnx2Te and spin polaronic shift has been computed for various magnetic and laser fields within the effective mass approximation in the finite barrier model using variational method. The results are presented and discussed. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/2790

    Instant restore after a media failure

    Full text link
    Media failures usually leave database systems unavailable for several hours until recovery is complete, especially in applications with large devices and high transaction volume. Previous work introduced a technique called single-pass restore, which increases restore bandwidth and thus substantially decreases time to repair. Instant restore goes further as it permits read/write access to any data on a device undergoing restore--even data not yet restored--by restoring individual data segments on demand. Thus, the restore process is guided primarily by the needs of applications, and the observed mean time to repair is effectively reduced from several hours to a few seconds. This paper presents an implementation and evaluation of instant restore. The technique is incrementally implemented on a system starting with the traditional ARIES design for logging and recovery. Experiments show that the transaction latency perceived after a media failure can be cut down to less than a second and that the overhead imposed by the technique on normal processing is minimal. The net effect is that a few "nines" of availability are added to the system using simple and low-overhead software techniques

    The Edge of the Galactic Disc

    Full text link
    As part of a stellar population sampling program, a series of photometric probes at various field sizes and depths have been obtained in a low extinction window in the galactic anticentre direction. Such data set strong constraints on the radial structure of the disc. At the forefront of this "drilling" program, very deep CCD frames probe the most external parts of the disc. Over the whole effective magnitude range (18 to 25), all contributions in the statistics which should be expected from old disc stars beyond 6 kpc vanish, although such stars dominate by far at distances less than 5 kpc. This is the signature of a sharp cut-off in the star density: the edge of the galactic disc between 5.5 and 6 kpc. As a consequence, the galactic radius does not exceed 14 kpc (assuming R//(//sun/)R/-/(//sun/)=8.5). Colours of elliptical galaxies measured in the field rule out the risk of being misled by undetected extinction.Comment: 8 pages, Besancon Observatory preprint n.

    Responding to Indo-Pacific rivalry: Australia, India and middle power coalitions

    Get PDF
    In this Analysis, Lowy Institute International Security Program Director Rory Medcalf and Nonresident Fellow C. Raja Mohan argue that Chinese assertiveness and uncertainties about America’s role in Indo-Pacific Asia are causing middle powers to look for alternative approaches to regional security. The Analysis argues that enhanced security cooperation between Indo-Pacific middle powers should be extended to the creation of “middle-power coalitions” in the region. Key findings China’s assertiveness and uncertainties about America’s response are causing middle powers in Indo-Pacific Asia to looking beyond traditional approaches to security Cooperation between Indo-Pacific middle power coalitions would build regional resilience against the vagaries of US-China relations India and Australia are well placed to form the core of middle power coalition buildin

    Unification and limitations of error suppression techniques for adiabatic quantum computing

    Full text link
    While adiabatic quantum computation (AQC) possesses some intrinsic robustness to noise, it is expected that a form of error control will be necessary for large scale computations. Error control ideas developed for circuit-model quantum computation do not transfer easily to the AQC model and to date there have been two main proposals to suppress errors during an AQC implementation: energy gap protection and dynamical decoupling. Here we show that these two methods are fundamentally related and may be analyzed within the same formalism. We analyze the effectiveness of such error suppression techniques and identify critical constraints on the performance of error suppression in AQC, suggesting that error suppression by itself is insufficient for fault-tolerant, large-scale AQC and that a form of error correction is needed. This manuscript has been superseded by the articles, "Error suppression and error correction in adiabatic quantum computation I: techniques and challenges," arXiv:1307.5893, and "Error suppression and error correction in adiabatic quantum computation II: non-equilibrium dynamics," arXiv:1307.5892.Comment: 9 pages. Update replaces "Equivalence" with "Unification." This manuscript has been superseded by the two-article series: arXiv:1307.5892 and arXiv:1307.589

    Stable quantum memories with limited measurement

    Get PDF
    We demonstrate the existence of a finite temperature threshold for a 1D stabilizer code under an error correcting protocol that requires only a fraction of the syndrome measurements. Below the threshold temperature, encoded states have exponentially long lifetimes, as demonstrated by numerical and analytical arguments. We sketch how this algorithm generalizes to higher dimensional stabilizer codes with string-like excitations, like the toric code.Comment: 11 Pages, 7 Figure
    corecore