A scientific classification method for electromagnetic launchers (EMLs) is presented and discussed. The classification method is based on the well-known binomial nomenclature method developed by Carl ...Linnaeus (circa 1700s) that is used in other botany and zoology to classify flora and fauna. This investigation starts by establishing a formal definition for the launcher and the EML that, respectively, characterize the device and group. The EML can then be categorized into its respective class and type according to how its accelerating force is generated. The method developed here does not interfere with the inventor's right to provide a common name for the EML. The scientific classification of EMLs highlights their similarities and differences to develop a better understanding of their operation and to produce more comprehensive general theories. The classification method is an intuitive approach that is both flexible to allow for changes in classification protocols and expandable to accommodate new EMLs that may be invented in the future.
West African summer monsoon precipitation is characterized by distinct decadal variability. Due to its well-documented link to oceanic boundary conditions in various ocean basins it represents a ...paradigm for decadal predictability. In this study, we reappraise this hypothesis for several sub-regions of sub-Saharan West Africa using the new German contribution to the coupled model intercomparison project phase 5 (CMIP5) near-term prediction system.In addition, we assume that dynamical downscaling of the global decadal predictions leads to an enhanced predictive skill because enhanced resolution improves the atmospheric response to oceanic forcing and land-surface feedbacks. Based on three regional climate models, a heterogeneous picture is drawn: none of the regional climate models outperforms the global decadal predictions or all other regional climate models in every region nor decade. However, for every test case at least one regional climate model was identified which outperforms the global predictions. The highest predictive skill is found in the western and central Sahel Zone with correlation coefficients and mean-square skill scores exceeding 0.9 and 0.8, respectively.
Basic Overview of Chemoinformatics Engel, Thomas
Journal of chemical information and modeling,
2006 Nov-Dec, Letnik:
46, Številka:
6
Journal Article
Recenzirano
There is no particular point in time that determines when chemoinformatics was founded or established. It slowly evolved from several, often quite humble beginnings. Scientists in various fields of ...chemistry struggled with the development of computer methods which allowed them to manage the enormous amount of chemical information and to find relationships between the structure and properties of a compound. During the 1960s some early developments appeared that led to a flurry of activities in the 1970s. This review provides a general overview of basic methods in the specific fields of chemoinformatics, from encoding chemical compounds, storing and searching data in databases, to generating and analyzing these data. In addition, the chief interconnecting points of chemoinformatics applications are highlighted including the contributions of Johann Gasteiger to this field.
We present efficiency and scaling relationships for dc (i.e., noninduction) constant inductance gradient electromagnetic launchers.We derive expressions for electromagnetic force, efficiency, ...back-voltage, and kinetic power in terms of electrical circuit parameters. We show that launcher efficiency is a simple function of armature velocity and the launcher’s characteristic velocity. The characteristic velocity characterizes the launcher and is the product of two new parameters: the mode constant and launcher constant. Mathematically, the launcher must operate at its characteristic velocity for 50% maximum efficiency. The mode constant reflects the manner in which the launcher is powered and its maximum efficiency. The launcher constant reflects the geometry of the launcher. We consider two modes of operation: constant current and zero exit current operation. We develop the ideal electromagnetic launcher concept and define it as operation at 100% maximum efficiency at all velocities.We also develop the concept of same-scale comparisons, that is, that electromagnetic launcher comparisons should be done with equal bore diameter, launcher length, projectile mass, and velocity. Finally, we present a comparative analysis based on experimental data of same-scale constant gradient electromagnetic launchers for conventional railgun, augmented railgun, and helical gun launchers in terms of the launcher constant, inductance gradient, bore diameter, bore length, system resistance, and armature (i.e., projectile) velocity.
A substantial proportion of cancer cases present with a metastatic tumor and require further testing to determine the primary site; many of these are never fully diagnosed and remain cancer of ...unknown primary origin (CUP). It has been previously demonstrated that the somatic point mutations detected in a tumor can be used to identify its site of origin with limited accuracy. We hypothesized that higher accuracy could be achieved by a classification algorithm based on the following feature sets: 1) the number of nonsynonymous point mutations in a set of 232 specific cancer-associated genes, 2) frequencies of the 96 classes of single-nucleotide substitution determined by the flanking bases, and 3) copy number profiles, if available.
We used publicly available somatic mutation data from the COSMIC database to train random forest classifiers to distinguish among those tissues of origin for which sufficient data was available. We selected feature sets using cross-validation and then derived two final classifiers (with or without copy number profiles) using 80 % of the available tumors. We evaluated the accuracy using the remaining 20 %. For further validation, we assessed accuracy of the without-copy-number classifier on three independent data sets: 1669 newly available public tumors of various types, a cohort of 91 breast metastases, and a set of 24 specimens from 9 lung cancer patients subjected to multiregion sequencing.
The cross-validation accuracy was highest when all three types of information were used. On the left-out COSMIC data not used for training, we achieved a classification accuracy of 85 % across 6 primary sites (with copy numbers), and 69 % across 10 primary sites (without copy numbers). Importantly, a derived confidence score could distinguish tumors that could be identified with 95 % accuracy (32 %/75 % of tumors with/without copy numbers) from those that were less certain. Accuracy in the independent data sets was 46 %, 53 % and 89 % respectively, similar to the accuracy expected from the training data.
Identification of primary site from point mutation and/or copy number data may be accurate enough to aid clinical diagnosis of cancers of unknown primary origin.
As a leading enabler of 5G, Network Slicing (NS) aims at creating multiple virtual networks on the same shared and programmable physical infrastructure. Integrated with 5GVehicle-to-Everything (V2X) ...technology, NS enables various isolated 5G-V2X networks with different requirements such as autonomous driving and platooning. This combination has generated new attack surfaces against Connected and Automated Vehicles (CAVs), leading them to road hazards and putting users' lives in danger. More specifically, such attacks can either intra-slice targeting the internal service within each V2X Network Slice (V2X-NS) or inter-slice targeting the cross V2X-NSs and breaking the isolation between them. However, detecting such attacks is challenging, especially inter-slice V2X attacks where security mechanisms should maintain privacy preservation and NS isolation. To this end, this paper addresses detecting inter-slice V2X attacks. To do so, we leverage both Virtual Security as a Service (VSaS) concept and Deep learning (DL) together with Federated learning (FL) to deploy a set of DL-empowered security Virtual Network Functions (sVNFs) over V2X-NSs. Our privacy preservation scheme is hierarchical and supports FL-based collaborative learning. It also integrates a game-theory-based mechanism to motivate FL clients (CAVs) to provide high-quality DL local models. We train, validate, and test our scheme using a publicly available dataset. The results show our scheme's accuracy and efficiency in detecting inter-slice V2X attacks.
Detecting passive attacks is always considered difficult in vehicular networks. Passive attackers can eavesdrop on the wireless medium to collect beacons. These beacons can be exploited to track the ...positions of vehicles not only to violate their location privacy but also for criminal purposes. In this paper, we propose a novel federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing. We first identify a set of strategies that can be used by attackers to efficiently track vehicles without being visually detected. We then build an efficient machine learning (ML) model to detect tracking attacks based only on the receiving beacons. Our scheme enables federated learning (FL) at the edge to ensure collaborative learning while preserving the privacy of vehicles. Moreover, FL clients use a semi-supervised learning approach to ensure accurate self-labeling. Our experiments demonstrate the effectiveness of our proposed scheme to detect passive mobile attackers quickly and with high accuracy. Indeed, only 20 received beacons are required to achieve 95% accuracy. This accuracy can be achieved within 60 FL rounds using 5 FL clients in each FL round. The obtained results are also validated through simulations.
Genetic and biochemical evidence has established that a SNARE complex consisting of syntaxin 5 (Sed5)-mYkt6 (Ykt6)-GOS28 (Gos1)-GS15 (Sft1) is required for transport of proteins across the Golgi ...stack in animals (yeast). We have utilized quantitative immunogold labeling to establish the cis-trans distribution of the v-SNARE GS15 and the t-SNARE subunits GOS28 and syntaxin 5. Whereas the distribution of the t-SNARE is nearly even across the Golgi stack from the cis to the trans side, the v-SNARE GS15 is present in a gradient of increasing concentration toward the trans face of the stack. This contrasts with a second distinct SNARE complex, also required for intra-Golgi transport, consisting of syntaxin 5 (Sed5)-membrin (Bos1)-ERS24 (Sec22)-rBet1 (Bet1), whose v-(rBet1) and t-SNARE subunits (membrin and ERS24), progressively decrease in concentration toward the trans face. Transport within the stack therefore appears to utilize countercurrent gradients of two Golgi SNAREpins and may involve a mechanism akin to homotypic fusion.
Abstract
Aufbauend auf den grundlegenden Forderungen der Bauordnung lassen sich aktuell in Deutschland verschiedene Erläuterungen zur Konkretisierungen des Schutzziels „Begrenzung der ...Brandausbreitung über die Fassade“ finden. Eine allgemeingültige Festlegung gibt es bisher nicht. Diese Festlegung wäre jedoch, insbesondere für die Betrachtung von neuen Fassaden und Außenwandbekleidungen, eine wichtige Basis. Die nachfolgende Studie beschreibt die aktuell in Deutschland zur Verfügung stehenden Grundlagen zur Bewertung „brandschutztechnisch sicherer“ Fassaden. Diese sind Prüfverfahren für Fassadenbrandversuche, Hintergründe für die Prüfverfahren, Vorgaben aus bauordnungsrechtlichen Richtlinien und Auslegungen der Bauaufsicht. Weiter werden die Vorgaben der europäischen Nachbarländer, die bereits ein konkretes Schutzziel definiert haben, dargestellt. Als Ergebnis stellt die Studie einen Vorschlag für Beurteilungskriterien für „brandschutztechnisch sichere“ Fassaden vor.
Abstract
Analysis of the acceptable fire spread at the façade
In addition to the fundamental requirements of the German Building Code, there are several mostly contradictory concretizations of the fire safety objective “limitation of fire spread at the facade”. There is currently no universal definition. However, this definition would be an important basis, in particular for the consideration of facades and exterior wall cladding made of combustible building materials. The following article describes the principles to evaluate fire‐safe facades currently available in Germany. These comprises, facade fire‐test methods, backgrounds about the test methods, specifications from building regulations guidelines and interpretations of the building authorities. Furthermore, the specifications of neighboring European countries, which already have defined a specific fire safety objective for facades, are presented. As a result, the article presents a proposal for assessment criteria for fire‐safe facades.
The rising prevalence of type 2 diabetes (T2D) poses a major global challenge. It remains unresolved to what extent transcriptomic signatures of metabolic dysregulation and T2D can be observed in ...easily accessible tissues such as blood. Additionally, large-scale human studies are required to further our understanding of the putative inflammatory component of insulin resistance and T2D. Here we used transcriptomics data from individuals with (n = 789) and without (n = 2127) T2D from the IMI-DIRECT cohorts to describe the co-expression structure of whole blood that mainly reflects processes and cell types of the immune system, and how it relates to metabolically relevant clinical traits and T2D.
Clusters of co-expressed genes were identified in the non-diabetic IMI-DIRECT cohort and evaluated with regard to stability, as well as preservation and rewiring in the cohort of individuals with T2D. We performed functional and immune cell signature enrichment analyses, and a genome-wide association study to describe the genetic regulation of the modules. Phenotypic and trans-omics associations of the transcriptomic modules were investigated across both IMI-DIRECT cohorts.
We identified 55 whole blood co-expression modules, some of which clustered in larger super-modules. We identified a large number of associations between these transcriptomic modules and measures of insulin action and glucose tolerance. Some of the metabolically linked modules reflect neutrophil-lymphocyte ratio in blood while others are independent of white blood cell estimates, including a module of genes encoding neutrophil granule proteins with antibacterial properties for which the strongest associations with clinical traits and T2D status were observed. Through the integration of genetic and multi-omics data, we provide a holistic view of the regulation and molecular context of whole blood transcriptomic modules. We furthermore identified an overlap between genetic signals for T2D and co-expression modules involved in type II interferon signaling.
Our results offer a large-scale map of whole blood transcriptomic modules in the context of metabolic disease and point to novel biological candidates for future studies related to T2D.