A&S 320: Mathematical Modeling in Biology
|
|
- Chester Stanley
- 5 years ago
- Views:
Transcription
1 A&S 320: Mathematical Modeling in Biology David Murrugarra Department of Mathematics, University of Kentucky These slides were modified from Matthew Macauley s lecture at Clemson University. Spring 2016 David Murrugarra (University of Kentucky) A&S 320: Reduction of Boolean network models Spring / 8
2 Application: Boolean model of Th-cell differentiation White blood cells or leukocytes are in the immune system and fight diseases and infections. One subtype are the lymphocytes, which includes the natural killer (NK) cells, B cells, and T cells, all which have different cellular functions. The T-cells circulate throughout our bodies in the lymph fluid, looking for cellular abnormalities, infections, and diseases. Helper T-cells (Th-cells) are a certain type of T-cells. They begin as naïve, or Th0 cells, and then differentiate into one of two phenotypes: 1 Type 1 are the Th1 cells which fight intracellular bacteria and protozoa. 2 Type 2 are the Th2 cells which fight extracellular parasites. Malfunctions of immune responses involving Th1 phenotypes can result in autoimmune diseases, whereas malfunctions involving Th2 phenotypes can result in allergic reactions. The biochemical signals that determine Th1 and Th2 differentiation act as a bistable switch, which permits either GATA3 or T-bet to be expressed, but not both. This was modeled using a 23-node Boolean network in Mendoza et. al (2006). David Murrugarra (University of Kentucky) A&S 320: Reduction of Boolean network models Spring / 8
3 Boolean model of Th-cell differentiation (Mendoza, 2006) x 1 = GATA3 f 1 = (x 1 x 21 ) x 22 x 2 = IFN-β f 2 = 0 x 3 = IFN-βR f 3 = x 2 x 4 = IFN-γ f 4 = (x 14 x 16 x 20 x 22 ) x 19 x 5 = IFN-γR f 5 = x 4 x 6 = IL-10 f 6 = x 1 x 7 = IL-10R f 7 = x 6 x 8 = IL-12 f 8 = 0 x 9 = IL-12R f 9 = x 8 x 21 x 10 = IL-18 f 10 = 0 x 11 = IL-18R f 11 = x 10 x 21 x 12 = IL-4 f 12 = x 1 x 18 x 13 = IL-4R f 13 = x 12 x 17 x 14 = IRAK f 14 = x 11 x 15 = JAK1 f 15 = x 5 x 17 x 16 = NFAT f 16 = x 23 x 17 = SOCS1 f 17 = x 18 x 22 x 18 = STAT1 f 18 = x 3 x 15 x 19 = STAT3 f 19 = x 7 x 20 = STAT4 f 20 = x 9 x 1 x 21 = STAT6 f 21 = x 13 x 22 = T-bet f 22 = (x 18 x 22 ) x 1 x 23 = TCR f 23 = 0 David Murrugarra (University of Kentucky) A&S 320: Reduction of Boolean network models Spring / 8
4 Boolean model of Th-cell differentiation Reduced model (by removing, in order, x 23, x 21, x 20,... ): Variable Boolean function Polynomial function x 1 = GATA3 h 1 (x 1, x 22 ) = x 1 x 22 h 1 (x 1, x 22 ) = x 1 x 22 + x 1 x 22 = T-bet h 22 (x 1, x 22 ) = x 1 x 22 h 22 = x 1 x 22 + x 22 There are three fixed points: (0, 0): GATA3 and T-bet are inactive, the signature of Th0 cells. (0, 1): Only T-bet is active, the signature of Th1 cells. (1, 0): Only GATA3 is active, the signature of Th2-cells. David Murrugarra (University of Kentucky) A&S 320: Reduction of Boolean network models Spring / 8
5 AND Boolean models In this section, we study a reduction method tailored specifically to AND Boolean models. AND networks are of the form f = (f 1,..., f n) : {0, 1} n {0, 1} n, where f i = x j1 x j2... x jk. Example The following Boolean network is an AND network. In Boolean form f 1 = x 2 x 3, f 2 = x 1 x 2 x 6, f 3 = x 2, f 4 = x 1 x 5, f 5 = x 5 x 6, f 6 = x 1 x 5 x 6, or in polynomial form f 1 = x 2 x 3, f 2 = x 1 x 2 x 6, f 3 = x 2, f 4 = x 5 x 1, f 5 = x 5 x 6, f 6 = x 1 x 5 x 6. David Murrugarra (University of Kentucky) A&S 320: Reduction of Boolean network models Spring / 8
6 AND Boolean models AND networks are completely determined by the wiring diagram. For example, f 1 = x 2 x 3 will be represented by arrows from x 2 and x 3 to x 1 (and no other arrows to x 1 ). A subgraph G i of a wiring diagram is strongly connected if there is a directed path from any vertex of G i to any other vertex in G i Figure: Wiring diagram (left) and some strongly connected subgraphs (right). A subgraph G i of a wiring diagram is a strongly connected component (scc) if it is strongly connected and is the largest strongly connected subgraph that contains G i, that is, G i cannot be made larger and still be strongly connected. If a scc has only one node and it does not have a self loop, then we call that scc trivial. David Murrugarra (University of Kentucky) A&S 320: Reduction of Boolean network models Spring / 8
7 AND Boolean models The main result in the reduction of AND networks is that strongly connected components can be replaced by a single node with a self loop. Example Consider the Boolean network f = (x 2 x 3, x 1 x 3, x 2, x 1 x 5, x 6, x 3 x 4 ) with wiring diagram shown in Figure 4 (left) Figure: Wiring diagram of AND network from Example 3 (left) with its strongly connected components highlighted in circles and the reduced wiring diagram (right). David Murrugarra (University of Kentucky) A&S 320: Reduction of Boolean network models Spring / 8
8 David Murrugarra (University of Kentucky) A&S 320: Reduction of. Boolean network models Spring / 8 AND Boolean models The main result in the reduction of AND networks is that strongly connected components can be replaced by a single node with a self loop. Example Consider the Boolean network f = (x 2 x 3, x 1 x 3, x 2, x 1 x 5, x 6, x 3 x 4 ) with wiring diagram shown in Figure 4 (left). The reduced network given in Figure 4 (right), which corresponds to the Boolean network h = h(x 1, x 4 ) = (x 1, x 1 x 4 ) and has steady states (x 1, x 4 ) = (0, 0), (1, 0), (1, 1). Then, the steady states of the original AND network are found using the equations x 2 = x 3 = x 1 and x 6 = x 5 = x 4 : x = , , Figure: Wiring diagram of AND network from Example 3 (left) with its strongly connected components highlighted in circles and the reduced wiring diagram (right)
Reduction of Boolean network models
Reduction of Boolean network models Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2016 M. Macauley (Clemson) Reduction
More informationBoolean networks, local models, and finite polynomial dynamical systems
Boolean networks, local models, and finite polynomial dynamical systems Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2017
More informationSignaling Networks: Asynchronous Boolean Models
Chapter 4 Signaling Networks: Asynchronous Boolean Models Réka Albert 1 and Raina Robeva 2 1 Pennsylvania State University, University Park, PA, USA, 2 Sweet Briar College, Sweet Briar, VA, USA 4.1 INTRODUCTION
More informationModeling of Complex Social. MATH 800 Fall 2011
Modeling of Complex Social Systems MATH 800 Fall 2011 Complex SocialSystems A systemis a set of elements and relationships A complex system is a system whose behavior cannot be easily or intuitively predicted
More informationModel checking for studying timing in T cell differentiation
Model checking for studying timing in T cell differentiation Natasa Miskov- Zivanov University of Pi4sburgh, School of Medicine November 20, 2013 CMACS PI mee4ng Tumor cell Tumor secreted cytokines (e.g.,
More informationComputability Theory
CS:4330 Theory of Computation Spring 2018 Computability Theory Other NP-Complete Problems Haniel Barbosa Readings for this lecture Chapter 7 of [Sipser 1996], 3rd edition. Sections 7.4 and 7.5. The 3SAT
More informationImplementation of a Computer Immune System for Intrusion- and Virus Detection
Implementation of a Computer Immune System for Intrusion- and Virus Detection Markus Christoph Unterleitner office@unterleitner.info February 13, 2006 2 Contents 1. Introduction... 11 1.1 Strategies of
More informationReductions and Satisfiability
Reductions and Satisfiability 1 Polynomial-Time Reductions reformulating problems reformulating a problem in polynomial time independent set and vertex cover reducing vertex cover to set cover 2 The Satisfiability
More informationQuickstart for Desktop Version
Quickstart for Desktop Version What is GeoGebra? Dynamic Mathematics Software in one easy-to-use package For learning and teaching at all levels of education Joins interactive 2D and 3D geometry, algebra,
More informationCSE 101, Winter Discussion Section Week 1. January 8 - January 15
CSE 101, Winter 2018 Discussion Section Week 1 January 8 - January 15 Important Annotations were added (post-lecture) to the tablet slides, to fill in a few gaps (Lecture 1) Look through Additional Resources
More informationP -vs- NP. NP Problems. P = polynomial time. NP = non-deterministic polynomial time
P -vs- NP NP Problems P = polynomial time There are many problems that can be solved correctly using algorithms that run in O(n c ) time for some constant c. NOTE: We can say that an nlogn algorithm is
More informationCPIB SUMMER SCHOOL 2011: INTRODUCTION TO BIOLOGICAL MODELLING
CPIB SUMMER SCHOOL 2011: INTRODUCTION TO BIOLOGICAL MODELLING 1 Getting started Practical 4: Spatial Models in MATLAB Nick Monk Matlab files for this practical (Mfiles, with suffix.m ) can be found at:
More informationMysterious or unsupported answers will not receive full credit. Your work should be mathematically correct and carefully and legibly written.
Math 2374 Spring 2006 Final May 8, 2006 Time Limit: 1 Hour Name (Print): Student ID: Section Number: Teaching Assistant: Signature: This exams contains 11 pages (including this cover page) and 10 problems.
More informationModeling and Simulating Social Systems with MATLAB
Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Olivia Woolley, Tobias Kuhn, Dario Biasini, Dirk Helbing Chair of Sociology, in particular of Modeling and Simulation ETH
More informationQuickstart for Web and Tablet App
Quickstart for Web and Tablet App What is GeoGebra? Dynamic Mathematic Software in one easy-to-use package For learning and teaching at all levels of education Joins interactive 2D and 3D geometry, algebra,
More informationOn Covering a Graph Optimally with Induced Subgraphs
On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number
More informationS206E Lecture 13, 5/22/2016, Grasshopper Math and Logic Rules
S206E057 -- Lecture 13, 5/22/2016, Grasshopper Math and Logic Rules Copyright 2016, Chiu-Shui Chan. All Rights Reserved. Interface of Math and Logic Functions 1. Basic mathematic operations: For example,
More informationStrongly Connected Components. Andreas Klappenecker
Strongly Connected Components Andreas Klappenecker Undirected Graphs An undirected graph that is not connected decomposes into several connected components. Finding the connected components is easily solved
More informationAn Introduction to Complex Systems Science
DEIS, Campus of Cesena Alma Mater Studiorum Università di Bologna andrea.roli@unibo.it Disclaimer The field of Complex systems science is wide and it involves numerous themes and disciplines. This talk
More information2. The LabView Environment Two panes will open, one is the Front panel, and one is the Block Diagram
E80 Spring 2015 Lecture 3 LabView 1. Creating a VI (Virtual Instrument) From the File drop-down menu, select New VI 2. The LabView Environment Two panes will open, one is the Front panel, and one is the
More information1. How many white tiles will be in Design 5 of the pattern? Explain your reasoning.
Algebra 2 Semester 1 Review Answer the question for each pattern. 1. How many white tiles will be in Design 5 of the pattern Explain your reasoning. 2. What is another way to represent the expression 3.
More informationCPIB SUMMER SCHOOL 2011: INTRODUCTION TO BIOLOGICAL MODELLING
CPIB SUMMER SCHOOL 2011: INTRODUCTION TO BIOLOGICAL MODELLING 1 COPASI COPASI / Parameter estimation Markus Owen COPASI stands for COmplex PAthway SImulator. It is for the simulation and analysis of biochemical
More informationV 1 Introduction! Mon, Oct 15, 2012! Bioinformatics 3 Volkhard Helms!
V 1 Introduction! Mon, Oct 15, 2012! Bioinformatics 3 Volkhard Helms! How Does a Cell Work?! A cell is a crowded environment! => many different proteins,! metabolites, compartments,! On a microscopic level!
More informationDanger Theory Concepts Improving Malware Detection of Intrusion Detection Systems that uses Exact graphs
2015 International Conference on Computational Science and Computational Intelligence Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems that uses graphs Suhair Amer Department
More informationL Modeling and Simulating Social Systems with MATLAB
851-0585-04L Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Karsten Donnay and Stefano Balietti Chair of Sociology, in particular of Modeling and Simulation ETH Zürich 2011-03-14
More informationOntologies. Sets of terms and the relationships between them... typically including is a relations. Terms often used to annotate objects.
Ontologies Sets of terms and the relationships between them... typically including is a relations. Terms often used to annotate objects. Abnormality Blood And Blood forming Tissues Immune System Physiology
More informationChapter 8.1: Circular Functions (Trigonometry)
Chapter 8.1: Circular Functions (Trigonometry) SSMTH1: Precalculus Science and Technology, Engineering and Mathematics (STEM) Strands Mr. Migo M. Mendoza Chapter 8.1: Circular Functions Lecture 8.1: Basic
More informationThreshold Dynamical Systems
January 6, 20 What s a TDS? What is a Threshold Dynamical System? Implementation of dynamical systems on graphs. What s a TDS? What is a Threshold Dynamical System? Implementation of dynamical systems
More informationMath 1131 Practice Exam 1 Spring 2018
Universit of Connecticut Department of Mathematics Spring 2018 Name: Signature: Instructor Name: TA Name: Lecture Section: Discussion Section: Read This First! Please read each question carefull. All questions
More informationLecture 10: Image-Based Modelling
Computational Biology Group (CoBI), D-BSSE, ETHZ Lecture 10: Image-Based Modelling Prof Dagmar Iber, PhD DPhil MSc Computational Biology 2015 Contents 1 Image-based Domains for Simulations Staining & Imaging
More informationAs an example of possible application we compute these invariants for connectome graphs which are studied in neuroscience.
STRONG CONNECTIVITY AND ITS APPLICATIONS arxiv:1609.07355v2 [cs.dm] 20 Oct 2016 PETERIS DAUGULIS Abstract. Directed graphs are widely used in modelling of nonsymmetric relations in various sciences and
More informationBlood Microscopic Image Analysis for Acute Leukemia Detection
I J C T A, 9(9), 2016, pp. 3731-3735 International Science Press Blood Microscopic Image Analysis for Acute Leukemia Detection V. Renuga, J. Sivaraman, S. Vinuraj Kumar, S. Sathish, P. Padmapriya and R.
More informationThe phenotype control kernel of a biomolecular regulatory network
Choo et al. BMC Systems Biology (2018) 12:49 https://doi.org/10.1186/s12918-018-0576-8 RESEARCH ARTICLE Open Access The phenotype control kernel of a biomolecular regulatory network Sang-Mok Choo 1, Byunghyun
More informationMSCBIO 2070/02-710: Computational Genomics, Spring A4: spline, HMM, clustering, time-series data analysis, RNA-folding
MSCBIO 2070/02-710:, Spring 2015 A4: spline, HMM, clustering, time-series data analysis, RNA-folding Due: April 13, 2015 by email to Silvia Liu (silvia.shuchang.liu@gmail.com) TA in charge: Silvia Liu
More informationRapidly Adaptive Cell Detection using Transfer Learning with a Global Parameter
Rapidly Adaptive Cell Detection using Transfer Learning with a Global Parameter Nhat H. Nguyen 1, Eric Norris 2, Mark G. Clemens 2, and Min C. Shin 1 1 Department of Computer Science, University of North
More informationCounty of Sacramento Instructions for filling out an online tree permit
To start your permit 1. Create an account or just log in if you already have an account. https://actonline.saccounty.net 2. Click on Apply for a Tree Permit Or in you already have a tree permit you can
More information7/27/2015. UNIT 10A Discrete Simulation. Last Time. Waking Up. How to generate pseudo-random numbers. Using randomness in interesting applications
15110 Principles of Computing, Carnegie Mellon University UNIT 10A Discrete Simulation 1 Last Time How to generate pseudo-random numbers Using randomness in interesting applications Monte Carlo simulations:
More informationDISH SIMULATOR: CAPTURING DYNAMICS OF CELLULAR SIGNALING WITH HETEROGENEOUS KNOWLEDGE
DISH SIMULATOR: CAPTURING DYNAMICS OF CELLULAR SIGNALING WITH HETEROGENEOUS KNOWLEDGE Khaled Sayed Yu-Hsin Kuo Electrical and Computer Engineering University of Pittsburgh Language Technologies Institute
More informationIntrusion Detection via Artificial Immune System: a Performance-based Approach
Intrusion Detection via Artificial Immune System: a Performance-based Approach Andrea Visconti, Nicoló Fusi, Hooman Tahayori Abstract In this paper, we discuss the design and engineering of a biologicallyinspired,
More informationCS6320: Intro to Intractability, Approximation and Heuristic Algorithms Spring Lecture 20: April 6
CS6320: Intro to Intractability, Approximation and Heuristic Algorithms Spring 2016 Lecture 20: April 6 Instructor: Prof. Ajay Gupta Scribe: Jason Pearson Many thanks to Teofilo Gonzalez for his lecture
More informationPhd. studies at Mälardalen University
Phd. studies at Mälardalen University Christopher Engström Mälardalen University, School of Education, Culture and Communication (UKK), Mathematics/Applied mathematics Contents What do you do as a Phd.
More informationEECS730: Introduction to Bioinformatics
EECS730: Introduction to Bioinformatics Lecture 15: Microarray clustering http://compbio.pbworks.com/f/wood2.gif Some slides were adapted from Dr. Shaojie Zhang (University of Central Florida) Microarray
More informationAlgorithms and Data Structures: Minimum Spanning Trees (Kruskal) ADS: lecture 16 slide 1
Algorithms and Data Structures: Minimum Spanning Trees (Kruskal) ADS: lecture 16 slide 1 Minimum Spanning Tree Problem Given: Undirected connected weighted graph (G, W ) Output: An MST of G We have already
More informationMathematics in Orbit
Mathematics in Orbit Dan Kalman American University Slides and refs at www.dankalman.net Outline Basics: 3D geospacial models Keyhole Problem: Related Rates! GPS: space-time triangulation Sensor Diagnosis:
More informationCMPSCI 250: Introduction to Computation. Lecture #22: Graphs, Paths, and Trees David Mix Barrington 12 March 2014
CMPSCI 250: Introduction to Computation Lecture #22: Graphs, Paths, and Trees David Mix Barrington 12 March 2014 Graphs, Paths, and Trees Graph Definitions Paths and the Path Predicate Cycles, Directed
More informationCMSC 150 LECTURE 7 RECURSION
CMSC 150 INTRODUCTION TO COMPUTING ACKNOWLEDGEMENT: THESE SLIDES ARE ADAPTED FROM SLIDES PROVIDED WITH INTRODUCTION TO PROGRAMMING IN JAVA: AN INTERDISCIPLINARY APPROACH, SEDGEWICK AND WAYNE (PEARSON ADDISON-WESLEY
More informationMulticasting in the Hypercube, Chord and Binomial Graphs
Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez Department of Computer Science University of California, Santa Barbara, CA, 93106 E-mail: {ccc,teo}@cs.ucsb.edu
More information9.1 Cook-Levin Theorem
CS787: Advanced Algorithms Scribe: Shijin Kong and David Malec Lecturer: Shuchi Chawla Topic: NP-Completeness, Approximation Algorithms Date: 10/1/2007 As we ve already seen in the preceding lecture, two
More informationγ(ɛ) (a, b) (a, d) (d, a) (a, b) (c, d) (d, d) (e, e) (e, a) (e, e) (a) Draw a picture of G.
MAD 3105 Spring 2006 Solutions for Review for Test 2 1. Define a graph G with V (G) = {a, b, c, d, e}, E(G) = {r, s, t, u, v, w, x, y, z} and γ, the function defining the edges, is given by the table ɛ
More informationSymbols and Terminology
Symbols and Terminology Layout: Root Subsite Talker Type Remote Traffic (Traffic that traverses the internet) Local Traffic (Traffic that doesn't enter the internet) Signifies that Local Traffic is currently
More informationIntroduction to PDEs: Notation, Terminology and Key Concepts
Chapter 1 Introduction to PDEs: Notation, Terminology and Key Concepts 1.1 Review 1.1.1 Goal The purpose of this section is to briefly review notation as well as basic concepts from calculus. We will also
More information8/27/2016. ECE 120: Introduction to Computing. Graphical Illustration of Modular Arithmetic. Representations Must be Unambiguous
University of Illinois at Urbana-Champaign Dept. of Electrical and Computer Engineering ECE 120: Introduction to Computing Signed Integers and 2 s Complement Strategy: Use Common Hardware for Two Representations
More informationSystem Identification Algorithms and Techniques for Systems Biology
System Identification Algorithms and Techniques for Systems Biology by c Choujun Zhan A Thesis submitted to the School of Graduate Studies in partial fulfillment of the requirements for the degree of Doctor
More informationSeparating Homeomorphisms
Advances in Dynamical Systems and Applications ISSN 0973-5321, Volume 12, Number 1, pp. 17 24 (2017) http://campus.mst.edu/adsa Separating Homeomorphisms Alfonso Artigue Universidad de la República Departmento
More informationVertex Cover is Fixed-Parameter Tractable
Vertex Cover is Fixed-Parameter Tractable CS 511 Iowa State University November 28, 2010 CS 511 (Iowa State University) Vertex Cover is Fixed-Parameter Tractable November 28, 2010 1 / 18 The Vertex Cover
More informationFixed Parameter Algorithms
Fixed Parameter Algorithms Dániel Marx Tel Aviv University, Israel Open lectures for PhD students in computer science January 9, 2010, Warsaw, Poland Fixed Parameter Algorithms p.1/41 Parameterized complexity
More informationSketching graphs of polynomials
Sketching graphs of polynomials We want to draw the graphs of polynomial functions y = f(x). The degree of a polynomial in one variable x is the highest power of x that remains after terms have been collected.
More informationTowards a Parallel, 3D Simulation of Platelet Aggregation and Blood Coagulation
Towards a Parallel, 3D Simulation of Platelet Aggregation and Blood Coagulation p. 1/22 Towards a Parallel, 3D Simulation of Platelet Aggregation and Blood Coagulation Oral Exam Elijah Newren January 7,
More informationlecture 10: B-Splines
9 lecture : -Splines -Splines: a basis for splines Throughout our discussion of standard polynomial interpolation, we viewed P n as a linear space of dimension n +, and then expressed the unique interpolating
More informationHOW TO ADD SIGNATURE TO MICROSOFT OFFICE OUTLOOK
HOW TO ADD SIGNATURE TO MICROSOFT OFFICE OUTLOOK QUARTER TO SEMESTER ICON VERSIONS: 2016, 2013 & OFFICE 365 HOW TO SAVE ICON TO COMPUTER Step 1: Open Email containing Quarters to Semesters Icon Click Here
More informationWELCOME TO LabVIEW 1
WELCOME TO LabVIEW 1 ELECTRICAL ENGINEERING 20N Department of Electrical Engineering and Computer Sciences University of California, Berkeley SIMON HONG, HSIN-I LIU, JONATHAN KOTKER, AND BABAK AYAZIFAR
More informationFor more info and downloads go to: Gerrit Stols
For more info and downloads go to: http://school-maths.com Gerrit Stols Acknowledgements GeoGebra is dynamic mathematics open source (free) software for learning and teaching mathematics in schools. It
More informationCS 140: Sparse Matrix-Vector Multiplication and Graph Partitioning
CS 140: Sparse Matrix-Vector Multiplication and Graph Partitioning Parallel sparse matrix-vector product Lay out matrix and vectors by rows y(i) = sum(a(i,j)*x(j)) Only compute terms with A(i,j) 0 P0 P1
More informationHigh-level modeling and verification of cellular signaling
High-level modeling and verification of cellular signaling Natasa Miskov-Zivanov University of Pittsburgh Electrical and Computer Engineering Bioengineering Computational and Systems Biology Pittsburgh,
More informationColoring Fuzzy Circular Interval Graphs
Coloring Fuzzy Circular Interval Graphs Friedrich Eisenbrand 1 Martin Niemeier 2 SB IMA DISOPT EPFL Lausanne, Switzerland Abstract Computing the weighted coloring number of graphs is a classical topic
More informationDecision and approximation complexity for identifying codes and locating-dominating sets in restricted graph classes
Decision and approximation complexity for identifying codes and locating-dominating sets in restricted graph classes Florent Foucaud a,b,c a Department of Mathematics, University of Johannesburg, Johannesburg
More information15 Graph Theory Counting the Number of Relations. 2. onto (surjective).
2. onto (surjective). You should convince yourself that if these two properties hold, then it is always going to be the case that f 1 is a function. In order to do this, you should remember the definition
More informationLesson 19. Opening Discussion
Opening Discussion 1. Think about the forms of the quadratic equations you ve written throughout this module. We have gone from vertex form to standard form and from factored form to standard form. Draw
More informationFinding a winning strategy in variations of Kayles
Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened
More informationECE521: Week 11, Lecture March 2017: HMM learning/inference. With thanks to Russ Salakhutdinov
ECE521: Week 11, Lecture 20 27 March 2017: HMM learning/inference With thanks to Russ Salakhutdinov Examples of other perspectives Murphy 17.4 End of Russell & Norvig 15.2 (Artificial Intelligence: A Modern
More informationBoth the polynomial must meet and give same value at t=4 and should look like this
Polymath Regression tutorial on Polynomial fitting of data The following table shows the raw data for experimental tracer concentration from a reactor which you need to fit using Polymath (refer Example
More informationVCell Tutorial. FRAP: Fluorescence Redistribution After Photo bleaching
VCell Tutorial FRAP: Fluorescence Redistribution After Photo bleaching Create a simple biomodel and spatial (PDE) application to simulate a photobleaching experiment and view the results. In this tutorial
More informationTechniques for Using the Method of Manufactured Solutions for Verification and Uncertainty Quantification of CFD Simulations Having Discontinuities
Techniques for Using the Method of Manufactured Solutions for Verification and Uncertainty Quantification of CFD Simulations Having Discontinuities Ben Grier Clemson University Richard Figliola, Larry
More informationBIOE 198MI Biomedical Data Analysis. Spring Semester Dynamic programming: finding the shortest path
BIOE 98MI Biomedical Data Analysis. Spring Semester 09. Dynamic programming: finding the shortest path Page Problem Statement: we re going to learn how to convert real life problem into a graphical diagram
More informationSteiner Tree. Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij
Steiner Tree Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij 1 The Steiner Tree Problem Let G = (V,E) be an undirected graph, and let N µ V be a subset of the terminals. A Steiner
More informationCellaVision. Ola Andersson Peter Wilson. Siemens Belgium
CellaVision Ola Andersson Peter Wilson Siemens Belgium CellaVision in short Headquarters in Lund, Sweden Around 80 employees globally Market support offices in the Nordic countries, the US, Canada, Japan,
More informationMachine Learning for Exploring State Space Structure in Genetic Regulatory Networks
Nova Southeastern University NSUWorks CEC Theses and Dissertations College of Engineering and Computing 2018 Machine Learning for Exploring State Space Structure in Genetic Regulatory Networks Rodney H.
More informationThe strong chromatic number of a graph
The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same
More informationAPPLYING SIMILARITIES BETWEEN IMMUNE SYSTEMS AND MOBILE AGENT SYSTEMS IN INTRUSION DETECTION
APPLYING SIMILARITIES BETWEEN IMMUNE SYSTEMS AND MOBILE AGENT SYSTEMS IN INTRUSION DETECTION Marek Zielinski, Lucas Venter School of Computing, University of South Africa Marek Zielinski (contact author):
More informationAlgorithms, Spring 2014, CSE, OSU Greedy algorithms II. Instructor: Anastasios Sidiropoulos
6331 - Algorithms, Spring 2014, CSE, OSU Greedy algorithms II Instructor: Anastasios Sidiropoulos Greedy algorithms Fast Easy to implement At every step, the algorithm makes a choice that seems locally
More informationCSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD
Recap. Growth rates: Arrange the following functions in ascending order of growth rate: n 2 log n n log n 2 log n n/ log n n n Introduction Algorithm: A step-by-step way of solving a problem. Design of
More informationSome Graph Theory for Network Analysis. CS 249B: Science of Networks Week 01: Thursday, 01/31/08 Daniel Bilar Wellesley College Spring 2008
Some Graph Theory for Network Analysis CS 9B: Science of Networks Week 0: Thursday, 0//08 Daniel Bilar Wellesley College Spring 008 Goals this lecture Introduce you to some jargon what we call things in
More informationDynamic Graph Algorithms
Dynamic Graph Algorithms Giuseppe F. Italiano University of Rome Tor Vergata giuseppe.italiano@uniroma2.it http://www.disp.uniroma2.it/users/italiano Outline Dynamic Graph Problems Quick Intro Lecture
More informationCombinatorial Algorithms. Unate Covering Binate Covering Graph Coloring Maximum Clique
Combinatorial Algorithms Unate Covering Binate Covering Graph Coloring Maximum Clique Example As an Example, let s consider the formula: F(x,y,z) = x y z + x yz + x yz + xyz + xy z The complete sum of
More informationSystems, ESD.00. Networks II. Lecture 8. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow
Introduction to Engineering Systems, ESD.00 Networks II Lecture 8 Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Outline Introduction to networks Infrastructure networks Institutional
More informationChapter 2: Rational. Functions. SHMth1: General Mathematics. Accountancy, Business and Management (ABM. Mr. Migo M. Mendoza
Chapter 2: Rational Functions SHMth1: General Mathematics Accountancy, Business and Management (ABM Mr. Migo M. Mendoza Chapter 2: Rational Functions Lecture 6: Basic Concepts Lecture 7: Solving Rational
More informationPHYC 500: Introduction to LabView. Exercise 1 (v 1.3) M.P. Hasselbeck, University of New Mexico
PHYC 500: Introduction to LabView M.P. Hasselbeck, University of New Mexico Exercise 1 (v 1.3) Setup The user interface of LabView is highly customizable. How this is done is a personal preference. For
More informationImproved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
Improved Algebraic of QUAD, Bivium and Trivium via on Equation Systems Kenneth Koon-Ho Wong 1, Gregory V. Bard 2 1 Information Security Institute Queensland University of Technology, Brisbane, Australia
More informationAccelerating Leukocyte Tracking Using CUDA: A Case Study in Leveraging Manycore Coprocessors
Accelerating Leukocyte Tracking Using CUDA: A Case Study in Leveraging Manycore Coprocessors Michael Boyer, David Tarjan, Scott T. Acton, and Kevin Skadron University of Virginia IPDPS 2009 Outline Leukocyte
More informationLecture 4: 3SAT and Latin Squares. 1 Partial Latin Squares Completable in Polynomial Time
NP and Latin Squares Instructor: Padraic Bartlett Lecture 4: 3SAT and Latin Squares Week 4 Mathcamp 2014 This talk s focus is on the computational complexity of completing partial Latin squares. Our first
More informationGeology Geomath Estimating the coefficients of various Mathematical relationships in Geology
Geology 351 - Geomath Estimating the coefficients of various Mathematical relationships in Geology Throughout the semester you ve encountered a variety of mathematical relationships between various geologic
More informationBoth the polynomial must meet and give same value at t=4 and should look like this
Polymath Regression tutorial on Polynomial fitting of data The following table shows the raw data for experimental tracer concentration from a reactor which you need to fit using Polymath (refer Example
More informationIncreasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems
Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Valentin Gies and Thierry M. Bernard ENSTA, 32 Bd Victor 75015, Paris, FRANCE, contact@vgies.com,
More information2. CONNECTIVITY Connectivity
2. CONNECTIVITY 70 2. Connectivity 2.1. Connectivity. Definition 2.1.1. (1) A path in a graph G = (V, E) is a sequence of vertices v 0, v 1, v 2,..., v n such that {v i 1, v i } is an edge of G for i =
More informationDynamically Random Graphs
Dynamically Random Graphs Alexis Byers, Wittenberg University Mallory Reed, Earlham College Laura Rucci, Cabrini College Elle VanTilburg, University of Texas-Austin SUMSRI 203 Miami University July 8,
More informationThe O key will power the unit on. To turn the unit off, press the yellow L key, then O key.
fx-9750gii Quick Reference Guide Selecting the RUN Q icon will allow you to perform general computations and arithmetic. The function keys allow you to access the tab (soft key) menus that will come up
More information5.0 Use of XML in Simisys
5.0 Use of XML in Simisys It was recognized during the evolution of the Simisys project that developing a robust way of obtaining, storing and using information is an essential aspect of this project.
More informationCritical Phenomena in Complex Networks
Critical Phenomena in Complex Networks Term essay for Physics 563: Phase Transitions and the Renormalization Group University of Illinois at Urbana-Champaign Vikyath Deviprasad Rao 11 May 2012 Abstract
More information2005 Academic Challenge
2005 Academic Challenge COMPUTER SCIENCE TEST - SECTIONAL Computer Science Test Production Team Sanjay Madria, University of Missouri at Rolla Author/Team Coordinator S. R. Subramanya, University of Missouri
More informationLecture 11: The PRAM Model
Comp 260: Advanced Algorithms Tufts University, Spring 2016 Prof. Lenore Cowen Scribe: Zhuting Xue Lecture 11: The PRAM Model 1 Basic Notations The PRAM stands for Parallel Random Access Machine, where
More information