2,999 research outputs found
On the Effect of Semantically Enriched Context Models on Software Modularization
Many of the existing approaches for program comprehension rely on the
linguistic information found in source code, such as identifier names and
comments. Semantic clustering is one such technique for modularization of the
system that relies on the informal semantics of the program, encoded in the
vocabulary used in the source code. Treating the source code as a collection of
tokens loses the semantic information embedded within the identifiers. We try
to overcome this problem by introducing context models for source code
identifiers to obtain a semantic kernel, which can be used for both deriving
the topics that run through the system as well as their clustering. In the
first model, we abstract an identifier to its type representation and build on
this notion of context to construct contextual vector representation of the
source code. The second notion of context is defined based on the flow of data
between identifiers to represent a module as a dependency graph where the nodes
correspond to identifiers and the edges represent the data dependencies between
pairs of identifiers. We have applied our approach to 10 medium-sized open
source Java projects, and show that by introducing contexts for identifiers,
the quality of the modularization of the software systems is improved. Both of
the context models give results that are superior to the plain vector
representation of documents. In some cases, the authoritativeness of
decompositions is improved by 67%. Furthermore, a more detailed evaluation of
our approach on JEdit, an open source editor, demonstrates that inferred topics
through performing topic analysis on the contextual representations are more
meaningful compared to the plain representation of the documents. The proposed
approach in introducing a context model for source code identifiers paves the
way for building tools that support developers in program comprehension tasks
such as application and domain concept location, software modularization and
topic analysis
Trust-Based Control of (Semi)Autonomous Mobile Robotic Systems
Despite great achievements made in (semi)autonomous robotic systems, human participa-tion is still an essential part, especially for decision-making about the autonomy allocation of robots in complex and uncertain environments. However, human decisions may not be optimal due to limited cognitive capacities and subjective human factors. In human-robot interaction (HRI), trust is a major factor that determines humans use of autonomy. Over/under trust may lead to dispro-portionate autonomy allocation, resulting in decreased task performance and/or increased human workload. In this work, we develop automated decision-making aids utilizing computational trust models to help human operators achieve a more e๏ฌective and unbiased allocation. Our proposed decision aids resemble the way that humans make an autonomy allocation decision, however, are unbiased and aim to reduce human workload, improve the overall performance, and result in higher acceptance by a human. We consider two types of autonomy control schemes for (semi)autonomous mobile robotic systems. The ๏ฌrst type is a two-level control scheme which includes switches between either manual or autonomous control modes. For this type, we propose automated decision aids via a computational trust and self-con๏ฌdence model. We provide analytical tools to investigate the steady-state e๏ฌects of the proposed autonomy allocation scheme on robot performance and human workload. We also develop an autonomous decision pattern correction algorithm using a nonlinear model predictive control to help the human gradually adapt to a better allocation pattern. The second type is a mixed-initiative bilateral teleoperation control scheme which requires mixing of autonomous and manual control. For this type, we utilize computational two-way trust models. Here, mixed-initiative is enabled by scaling the manual and autonomous control inputs with a function of computational human-to-robot trust. The haptic force feedback cue sent by the robot is dynamically scaled with a function of computational robot-to-human trust to reduce humans physical workload. Using the proposed control schemes, our human-in-the-loop tests show that the trust-based automated decision aids generally improve the overall robot performance and reduce the operator workload compared to a manual allocation scheme. The proposed decision aids are also generally preferred and trusted by the participants. Finally, the trust-based control schemes are extended to the single-operator-multi-robot applications. A theoretical control framework is developed for these applications and the stability and convergence issues under the switching scheme between di๏ฌerent robots are addressed via passivity based measures
์ธ์ฒด ์ ๋ฐฉ์์์ Peptidyl-prolyl cis-trans isomerase NIMA-interacting 1 (Pin1)๊ณผ์ ์ง์ ๊ฒฐํฉ์ ํตํ Nrf2์ ์์ ํ ์ฐ๊ตฌ
ํ์๋
ผ๋ฌธ (๋ฐ์ฌ) -- ์์ธ๋ํ๊ต ๋ํ์ : ์ตํฉ๊ณผํ๊ธฐ์ ๋ํ์ ๋ถ์์ํ ๋ฐ ๋ฐ์ด์ค์ ์ฝํ๊ณผ, 2020. 8. Surh Young-Joon.Peptidyl-prolyl cis-trans isomerase NIMA-interacting 1 (Pin1) specifically recognizes phosphorylated serine or threonine of a target protein and isomerizes the adjacent proline residue. Overexpression of Pin1 has been found in many types of malignancies, suggesting its oncogenic function. Recent studies have revealed constitutive activation of Nrf2, a transcription factor that regulates cellular redox homeostasis, in some transformed or cancerous cells, conferring an advantage for their growth and survival. Silencing of Pin1 by using siRNA or pharmacologic inhibition blocked the accumulation of Nrf2, thereby suppressing proliferation and clonogenicity of MDA-MB-231 human breast cancer cells and xenograft tumor growth in nude mice. Since Nrf2 harbours pSer/Thr-Pro motifs, I investigated whether Pin1 could directly interact with Nrf2 in the context of its implications in breast cancer development and progression. I found that Pin1 binds to Nrf2 which stabilizes this transcription factor by hampering proteasomal degradation. Notably, the interaction between Pin1 and Nrf2 was dependent on the phosphorylation of Nrf2 at Ser 215, 408 and 577. In another study, Keap1, the main inhibitor of Nrf2, was found to be phosphorylated at Ser 104 and Thr 277. These amino acids are preceded by proline and hence can be the putative binding sites for Pin1. I found the direct interaction between Keap1 and Pin1, and this was abolished upon substation of Ser 104 and Thr 277 with Alanine. The interaction of Nrf2 with Keap1 was markedly increased when Pin1 was downregulated. On the other hand, Keap1 knockout embryonic fibroblasts exhibited the enhanced interaction between Nrf2 and Pin1. Therefore, it is likely that Pin1 and Nrf2 may compete with each other for Keap1 binding. In conclusion, Pin1 plays a role in stabilization and constitutive activation of Nrf2 interfering the interaction between Nrf2 and Keap1.๋จ๋ฐฑ์ง์ ์ธ์ฐํ๋ ์ธํฌ๋ด ์ ํธ์ ๋ฌ ๋จ๋ฐฑ์ง๋ค์ ํ์ฑ์ ์ํฅ์ ๋ฏธ์น๋ฉฐ, ์ธํฌ๋ด ๊ธฐ๋ฅ ์กฐ์ ์ ์ํด ๋งค์ฐ ์ค์ํ ์ญํ ์ ๋ด๋นํ๋ค. ์ธ์ฐํ ๋ถ์ ์ค ์ธ๋ฆฐ/ํธ๋ ์ค๋ ๋ค์์ ํน์ด์ ์ผ๋ก ํ๋กค๋ฆฐ (pSer/Thr-Pro)์ด ์์นํ ๊ฒฝ์ฐ CDKs, MAPKs, and GSK-3ฮฒ๋ฑ๊ณผ ๊ฐ์ proline directed kinase๋ค (์ ์ํด ์ธ์ฐํ๋๋ค. ํ๋กค๋ฆฐ์ cis๋ trans์ conformation์ ๋ชจ๋ ์ฑํํ ์ ์์ด ๋จ๋ฐฑ์ง์ ์ ํ์ด๋ ๊ธฐ๋ฅ ํ์ฑ์ ์กฐ์ ํ๋ค. Pin1 (peptidyl-prolyl isomerase family of proteins)์ ํ๋กค๋ฆฐ ์๊ธฐ์ cis/trans์ ์ด์ฑํ๋ฐ์์ ์ด๋งคํ๋ ํจ์๋ก์ ์ธ์ฐํ๋ ์ธ๋ฆฐ/ํธ๋ ์ค๋ ๋ค์์ ํ๋กค๋ฆฐ์ด ์ค๋ motif์ ์ ์ผํ๊ฒ ๊ฒฐํฉํ์ฌ cis/trans ์ด์ฑ์งํ๋ฅผ ์ด์งํ๋ค. Pin1์ ๊ตฌ์กฐ๋ N-๋ง๋จ์ ์๋ WW ๋๋ฉ์ธ๊ณผ C-๋ง๋จ์ ์๋ PPIase ๋๋ฉ์ธ์ผ๋ก ์ด๋ฃจ์ด์ ธ ์์ผ๋ฉฐ, WW ๋๋ฉ์ธ์ ๊ธฐ์ง ๋จ๋ฐฑ์ง๊ณผ ๊ฒฐํฉํ๊ณ PPIase ๋๋ฉ์ธ์ ์ธ์ฐํ๋ ์ธ๋ฆฐ/ํธ๋ ์ค๋-ํ๋กค๋ฆฐ (pSer/Thr-Pro) ๋ชจํฐํ์ ํ๋กค๋ฆฐ ์ด์ฑ์งํ๋ฅผ ํตํ ๊ตฌ์กฐ ๋ณํ์ ๊ด์ฌํ๋ค. Pin1์ ์ํ ๊ธฐ์ง ๋จ๋ฐฑ์ง์ ๊ตฌ์กฐ ๋ณํ๋ ๋จ๋ฐฑ์ง์ ํ์ฑ, ๋จ๋ฐฑ์ง ์ํธ๊ฒฐํฉ ๋ฐ ์ธํฌ๋ด ๋ถํฌ์ ์์ ์ฑ์ ์ํฅ์ ๋ฏธ์น๋ค. Pin1์ ์ธํฌ ์ฃผ๊ธฐ ๋ฐ๋ฌ์์ ์ค์ํ ์ญํ ์ ํ๋ ๋จ๋ฐฑ์ง๋ค์ ์กฐ์ ํ๋ ๊ฒ์ผ๋ก ์๋ ค์ ธ ์ธํฌ๋ด์ Pin1 ๋จ๋ฐฑ์ง ๋ฐํ ์์ค์ ๋ณํ๋ ์ธํฌ์ ๊ณผ๋ํ ์ฆ์๊ณผ ๊ด๋ จ๋ ์ง๋ณ์ธ ์์ ๋ฐ์ ๋ฐ ์งํ์ ์ํฅ์ ์ค ์ ์๋ค
Nrf2๋ ์ฐํ์ ์คํธ๋ ์ค์ ์ํด ์ ๋ฐ๋๋ ์ผ์ฆ, ์ ๋ฐ์, ์ฌํ๊ด๊ณ ์งํ, ๋ฐ ๋น๋จ๋ฑ์ ๋ณ๋ฆฌํ์ ๊ณผ์ ์ ๊ด์ฌํ์ฌ ์ธํฌ๋ฅผ ๋ณดํธํด ์ค๋ค. ์ ์์ ์ธ ์ํ์์ Nrf2๋ ์ ํด๋จ๋ฐฑ์ง์ธ kelch-like ECH-associated protein 1 (Keap1)์ ๊ฒฐํฉ๋ ๋นํ์ฑ ์ํ๋ก ์ธํฌ์ง๋ด์ ์กด์ฌํ๋ค. ํ์ง๋ง ์ธํฌ๊ฐ ํ์ฑ์ฐ์์ข
๋๋ ์น์ ์์ฑ ๋ฌผ์ง์ ์ํด ์๊ทน๋๋ฉด Nrf2์ ์ธ์ฐํ ๋๋ Keap1์ด thiol modification์ ํตํด Keap1์ผ๋ก๋ถํฐ Nrf2๊ฐ ๋ถ๋ฆฌ๋๋ค. ์ดํ Nrf2๋ ํต๋ด๋ก ์ด๋ํ๊ณ , ํต๋ด์ ์กด์ฌํ๋ small Maf ๋จ๋ฐฑ์ง๊ณผ ๋ณตํฉ์ฒด๋ฅผ ์ด๋ฃฌํ ํญ์ฐํ ํจ์์ ํ๋ก๋ชจํฐ ์ง์ญ์ ๊ฒฐํฉํจ์ผ๋ก์จ phase II ํญ์ฐํ/ํด๋
ํ ํจ์์ ๋ฐํ์ ์กฐ์ ํ๋ค. ๊ทธ๋ฌ๋ ์คํธ๋ ์ค์ ๋ฐ์ํ์ฌ ์ผ์์ ์ผ๋ก ํ์ฑํ๋๋ ์ ์์ธํฌ์ ๊ฒฝ์ฐ์ ๋ฌ๋ฆฌ ์
์ฑ ์ข
์ ์ธํฌ์์ Nrf2์ ๊ณผ๋ํ ์ง์์ ์ธ ๋ฐํ์ ์์ธํฌ์ ์ฑ์ฅ์ ์ด์ง์ํค๊ณ ํญ์์น๋ฃ์ ํจ๊ณผ๋ฅผ ๊ฐ์์ํจ๋ค. Nrf2 ๋จ๋ฐฑ์ง์๋ ๋ค์์ Pin1 ๊ฒฐํฉ๋ถ์ (pSer/Thr-Pro motifs)๊ฐ ์กด์ฌํ๋ฏ๋ก, Pin1๊ณผ Nrf2๊ณผ์ ์ํธ์์ฉ๊ณผ ์ด๋ฅผ ํตํ ์ ๋ฐฉ์ ์ฆ์ ๋ฐ ์งํ์ ๋ฏธ์น๋ ์ํฅ์ ๊ดํ์ฌ ์ฐ๊ตฌํ์๋ค. ํนํ, Nrf2 ๋จ๋ฐฑ์ง์ ์ธ๋ฆฐ 215, 408 and 577์ ์ธ์ฐํ ์๊ธฐ๊ฐ Pin1 ๊ณผ์ ๊ฒฐํฉ ๋ถ์์์ ํ์ธํ์๊ณ , Pin1๊ณผ Nrf2์ ๊ฒฐํฉ์ Nrf2์ ํ๋กํ
์์ข์ ์ํ ๋ถํด๋ฅผ ์ต์ ํจ์ผ๋ก์จ Nrf2์ ์์ ํ์ ๊ด์ฌํจ์ ์ ์ ์์๋ค.
ํํธ, Nrf2์ ์ฃผ์ ์ต์ ๋จ๋ฐฑ์ง์ธ Keap1์ ์ ๋ฐฉ์ ์ธํฌ๋ด์์ ์ธ๋ฆฐ 104๋ฒ ์๊ธฐ์ ํธ๋ ์ค๋ 277๋ฒ ์๊ธฐ์์์ ์ธ์ฐํ๊ฐ ์ด๋ฃจ์ด์ง์ ESI-LC-MS ๋ถ์์ ํตํ์ฌ ํ์ธํ์๊ณ , ์ธ๋ฆฐ 104๋ฒ ์๊ธฐ์ ํธ๋ ์ค๋ 277๋ฒ ์๊ธฐ์ ์ธ์ฐํ๊ฐ ์ฐจ๋จ๋ ๋์ฐ๋ณ์ด ์ธํฌ๋ Pin1๊ณผ์ ์ง์ ์ ๊ฒฐํฉ์ด Keap1 wild type ์ธํฌ์ ๋นํด ํ์ ํ ๊ฐ์ํจ์ ํ์ธ ํ ์ ์์๋ค. ๋ํ Pin1 siRNA๋ฅผ ์ฒ๋ฆฌํ MDA-MB-231 ์ธํฌ์์๋ control siRNA ๊ทธ๋ฃน์ ๋นํด Nrf2์ Keap1์ ๊ฒฐํฉ์ด ์ฆ๊ฐํ์์ผ๋ฉฐ, Keap1 knockout ๋ง์ฐ์ค ๋ฐฐ์์์ ๋ถ๋ฆฌํ ์ฌ์ ์์ธํฌ(embryonic fibroblasts)์์๋ Nrf2์ Pin1์ ๊ฒฐํฉ์ด ์ฆ๊ฐ๋์๋ค. ์ด๋ฅผ ํตํ์ฌ Pin1๊ณผ Nrf2๋ Keap1๊ณผ์ ๊ฒฐํฉ์ ์์ด์ ์๋ก ๊ฒฝ์์ ์ญํ ์ ํจ์ ํ์ธํ์๋ค. ๊ทธ๋ฌ๋ฏ๋ก Pin1์ Nrf2์ Keap1์ฌ์ด์ ๊ฒฐํฉ์ ๋ฐฉํดํ๋ฉฐ Nrf2 ๋จ๋ฐฑ์ง์ ํ์ฑํ์ ์์ ํ์ ๊ด์ฌํ ๊ฒ์ผ๋ก ์ฌ๋ฃ๋๋ค.CHAPTER I
General verview 1
1. Peptidyl-prolyl cis-trans isomerase NIMA-interacting 1 (Pin1) in cancer 2
1.1. Pin1 has critical roles in breast cancer development and progression 2
1.2. Regulation of Pin1 gene expression in human breast cancer 3
1.3. Expression, post-translational modifications and subcellular localization of Pin1 4
1.4. The significance of Pin1 phosphorylation 8
1.5. Pin1 regulates signaling molecules associated with cancer and cancer stem cells. 8
1.6. Pin1 mediates drug resistance of breast cancer 9
1.7. Pin1 inhibitors 9
2. Nrf2 in cancer 12
2.1. Nrf2 promotes tissue invasion and metastasis 12
2.2. Role of Nrf2 in resistance to chemotherapy 13
2.3. Keap1 as an inhibitor of Nrf2 13
2.4. Keap1-independent regulation of Nrf2 14
2.5. Post-translational modifications of Nrf2 15
2.6. Protein stabilization of Nrf2. 17
REFERENCES 19
STATEMENT OF PURPOSE 36
CHAPTER II 37
Pin1 stabilizes Nrf2 in a Keap1 independent manner in breast cancer . 37
ABSTRACT 38
1. INTRODUCTION. 40
2. MATERIALS AND METHODS 43
3. RESULTS. 55
4. DISCUSSION. 99
REFERENCES. 104
CHAPTER III 111
H-Ras induces Nrf2-Pin1 interaction: Implications for breast cancer progression. 111
ABSTRACT. 112
1. INTRODUCTION. 113
2. MATERIALS AND METHODS 116
3. RESULTS. 124
4. DISCUSSION. 144
REFERENCES. 149
ABSTRACT IN KOREAN.. 160
CURRIULUM VITAE 165Docto
Menโs Jeans Fit Based on Body Shape Categorization
The purpose of this study was to categorize lower body shape in men and to investigate the interplay between body shape and fitting issues appearing in menโs jeans. More specifically, the goal of the study was to improve apparel fit based on body shape. The detailed objectives of the study were to: (1) Categorize male body shapes using statistical analysis; (2) use 3D virtual fitting technology to assess fit and develop a shape-driven pants block pattern for each body shape.
This quantitative study was conducted in three stages: (1) categorizing the body shape of 1420 male scans, aged 18-35, from the SizeUSA dataset, (2) develop a shape-driven pants block pattern for each identified body shape, and (3) validate the developed blocks by virtually trying the shape-driven block pattern on fit testers from different body shape groups.
Exploratory Factor Analysis (EFA) and cluster analysis were used for body shape categorization, which resulted in three different body shapes: (1) Flat-Straight, (2) Moderate Curvy-Straight, and (3) Curvy. Three fit models were selected from each identified body shape group and then patterns were developed using Armstrongโs (2005) jeans foundation method. Patterns were modified and fitted to the selected representative fit models of each body shape group. The developed shape-driven block patterns were simulated on the fit testers to further explore the relationship between body shape and fit issues.
This study suggests that two individuals with identical body measurements may experience very different fit problems tailored to their different body shapes. It was found that each body shape would exclusively experience unique fit issues. Furthermore, the shape driven block patterns were found to be highly correlated with their host body shape category. This research implies that if the mass customization process starts with block patterns that are engineered for specific body shape categories significantly less fit issues would appear and the desired fit would be achieved in fewer fitting sessions
Mine schedule optimization with geotechnical constraints
If a mining project consists of n stoping activities these can be scheduled in n! ways according to
the duration between the activities and their precedence. Mine schedule optimization
manipulates the precedence relationships and the duration of the mining activities in order to
maximize the Net Present Value (NPV). However, unexpected instabilities may impede or
disrupt the schedule and thus reduce the profitability and so geotechnical aspects of the operation
need to be taken into account.
The mine schedule optimization software considered in this work is the so-called Schedule
Optimization Tool (SOT). This thesis reports the work for development of new geomechanical
constraints for any mine scheduling tool to find the safest and the most profitable schedule,
exemplified within the SOT framework.
The core hypothesis of this research is that there is a time-dependent aspect of the rock behaviour
that leads to instability, a consequence of dependence of geotechnical instability upon the
sequence and duration between stoping activities. There is evidence presented in this work that
supports this hypothesis.
An automated procedure for timely and computationally efficient calculations of the instability
metrics is presented. This can be applied to evaluate the geomechanical stability of any of the n!
schedules for excavating n stopes or applied to evaluate geomechanical stability of schedules
arising in the schedule optimization process. However, in practice, the number of feasible
schedules is much less than n! due to the precedence constraints. The approach starts with
computing n elastic stress fields induced after excavating each individual stope independently
within an identical computational domain using Compute3D. The stress-time series of each
iv
and/or every sequence of stoping are generated through superimposition of these pre-computed
stress fields, and the time stamps of blasting for excavation are allocated corresponding to the
stoping timetable. Different blasts are allowed to be timetabled at the same time. By means of
Hookeโs law and the 3D Kelvin-Voigt creep model the elastic strain time series and the
viscoelastic strain time series are produced for the stress-time series. Based on the Mohr-
Coulomb Failure criterion three (in)stability indicators are defined:
i. โStrength Factorโ to evaluate state of stress at each stage of each schedule as a proportion
of is strength
ii. โStrainth Factorโ to evaluate state of elastic strain at each stage of each schedule as a
proportion of a limiting โruptureโ strain
iii. โViscoelastic-strainth Factorโ to evaluate state of viscoelastic strain at each stage of each
schedule as a proportion of a limiting โruptureโ strain.
To provide a perspective of the (in)stability condition in the computational domain for all the
feasible sequences of stoping, 12 (in)stability metrics were defined and the results of each are
illustrated in the form of โ(in)stability indicator diagramsโ. The overall methodology is applied
to an example of excavating 6 open stopes.
Additionally, a methodology is theorized to evaluate the stability condition in the rock mass
surrounding the stopes for a series of stoping and backfilling schedules. The methodology is
based on pre-computing one additional stress field element for each stope, which represents the
effect of the fill loading on the rock mass. The calculations for this approach are consistent with
the time and computational efficiency of the original methodology. The computational effort
v
increases to โ2nโ pre-computed stress fields rather than โnโ: as problem sizes double,
computational time doubles, rather than increases in polynomial or exponential time.Master of Applied Science (M.Sc.) in Natural Resources Engineerin
The Powerful Woman
The Powerful Woman is the continuation of exploration of Transformational Reconstruction, an innovative draping and pattern-making technique (Sato, 2011). I have been working with TR for past few years. With this piece I continue to expand my knowledge of creating pattern pieces in combination with knitting and felting techniques. Iranian men\u27s clothing of Bakhtiari tribe, Chogha, inspired this design. Chogha is a white upper-bodice garment with black stripes, which represent the victory of goodness over evilness (Dashtaki, 2013). The goals of creating this dress were to (a) combine cultural approach with modern origami look and (b) combine TR method with felting techniques to emulate men\u27s clothing to design a garment for powerful woman. The feeling of the power derived by Chogha was transferred into modern and wearable dress for powerful woman by accentuating the shoulder. Felting textile technique was started with knitting the skirt piece with black and white wool yarns then felted in a hot cycle of washing machine. Pattern pieces were attached together with needle felting technique, agitation and compression caused the wool fibers to capture each other
- โฆ